SlideShare a Scribd company logo
Online Certificate Course
on
Cyber Law
Paper – I
Introduction to the Cyber World and Cyber Law
Part A
Cyber World – An Overview
For
THE INDIAN LAW INSTITUTE
(Deemed University)
Bhagwandas Road
New Delhi - 110001
Cyber World – An Overview Page 2 of 31
Table of contents
Topics Page
1. Cyber World: An Overview
1.1. Understanding the scope of computers in our daily life
1.2. Basic / Fundamental Principle of computer
1.3. The “E” Zone
1.4. Where did the computer come from
2. What is a computer Network?
3. Pre-requisites of Internet Connection
4. Basic working of ISP
5. Connecting to ISP
5.1. Dialup
5.2. Broadband
5.3. Cellular
5.4. Fibre
6. Use of Internet
7. Security of Information
8. Type of Threats
9. Prevention from threats
10. Digital Signatures
3
3
3
3
4
5
14
17
18
18
20
21
22
23
25
26
29
30
This paper provides an overview of cyber world with reference to-
• The Internet and online resources
• Security of Information
• Digital Signature
Revision 1.
Cyber World – An Overview Page 3 of 31
1. Cyber World: An Overview
1.1. Understanding the scope of computers in our daily life
There is no doubt, that in today’s world, computer are used everywhere, when we
mean everywhere, it could be your local shopping center, computer center, be it your
railway reservations, airlines reservation, micro-wave ovens, even your phones.
Institutions like banks, not only ease the use of banking functions, but also give us
flexibility to bank from virtually anywhere.
With a swipe from your plastic money (Debit/Credit Cards), it fetches balance
information from your bank’s account and there you go, you just purchased the
commodity without even bothering, how many gadgets, complex security codes went
through and helped you to purchase.
1.2. Basic / Fundamental Principle of computer
A computer receives an INPUT, then it PROCESSES it, and then gives OUTPUT.
When they (electronic gadgets) receive an input, they definitely give an output after
some calculations, whether we realize immediately or later. Eg: Employees in an
organization would enter their attendance, and upon request at end of month to
computer, it immediately generates salary slip based on the attendance. On other
hand, there can be an instant output; like when you type anything on keyboard, it gets
displayed immediately on your screen in respective application software!
1.3. The “E” Zone
There could be numerous such examples where our life has been attached with ‘e’.
Be it mail that got converted to e-mail, your banking became e-banking, commerce
became e-commerce, and so on. This ‘e-’ stands for Electronics. Now that makes
better sense when “Electronic” is prefixed like:- Electronic mail called as E-Mail.
Electronic Banking called as E-Banking etc.
When we speak of Cyber, it is a prefix, derived from cybernetics (a Greek word
meaning "the art of steering"), used to describe the entire range of things made
available through the use of a computer. It does not exist in physical boundaries.
Earlier the term ‘cyber’ was used in fiction stories, but now it is used commonly. For
example: cyber-phobia is an irrational fear of computers, cyberspace is the virtual
(nonphysical) space created by computer systems. Something like we talk about
fairy tales or dreams, they don’t exist, but a nightmare can certainly wake you up in
middle of night.
Cyber World – An Overview Page 4 of 31
But when we talk about some terms like cyber-space in terms of our scope, we
combine not only the humans, computers (hardware and/or software), but also to the
extent that one (computer) is almost capable to do that. It would include your mobile
phones, gaming gadgets like Play station, X-box, smart watches etc. Mostly,
whenever cyber is used, term is associated with science fiction, as simply as a
computer is not capable of thinking. However, it is used in most of activities like
booking tickets, tours, communicating with people through virtual world; you never
know who really is on the other side, unless met him/her.
1.4. Where did the computer come from
Necessity is the mother of invention and un-fortunately, the computers are invention
of Cold Wars. In beginning, they were humongous, very large in size, would cover a
size of a football ground, and may be bigger. It used to consume power that would in
today’s world give electricity to one colony in itself! But as computers can be trusted
more for efficiency than humans if we give a repeated task, it definitely supersedes
humans in certain areas. As a matter of fact, they instate discipline in work. One has
to follow certain guidelines to attain a job done from computers. Let us take a small
example, when banking was done manually, Customers could have a ‘personal
influence’ on the banker or bank manager, the customer was informed over the phone
before actually taking an action. But since computers are in place, it would work
irrationally even if it’s a new customer, or old or his relative. I’m sure, flight
bookings and their management couldn’t have been better as we have the facility to
book, tickets, get best fares, compare with various online agents (websites). This
facility is not only extended to our computers at home, but also extended to our
mobile phones which is capable of connect to ‘network’ anytime & almost anywhere.
Moreover, the art of communication has become so advanced and easy to reach, it
helps in transfer of information / data from any place (device) to any place (device).
Gone are the days when one had to make a school projects, business presentations,
now-a-days, one can search projects, themes and then continue to add wings to one’s
concept.
Cyber World – An Overview Page 5 of 31
2. What is a computer Network?
Computer Network: To be able to communicate and share resources (knowledge or
information, hardware equipments, software etc) between two or more computers.
One just has to ‘share’ the equipment/information, and it becomes available to others.
Telephones were the one of the first electronic gadgets, which helped humans to interact
with each other. However, it could only send voices across. One would have to dial the
desired phone number and have conversation.
There was one more invention – Radio. But it could communicate only one-way. We
may not put radio and television in category of communication. And Cyber Space – one
of the best and economic way to bridge gap between each other, it is irrespective of
physical boundaries and distances.
Have you ever imagined, that if a person in country “A” makes a call to another country
“B”, the call has to go through various networks of telephone exchanges, however when
you speak from here, the other person (if both use same language to communicate) is also
able to hear and respond accordingly. This is irrespective of the path that it took. This
happens because even if they use different machines / gadgets, they have to follow same
set of rules, just like on road, one has to follow traffic rules to avoid chaos, and it does not
depend on which vehicle you are driving.
Similarly, in computer networking, there are a few standard sets of rules which both
(or more than two) have to follow if they want to ‘network’ with each other. These set of
rules are also called as Protocol.
Protocol: A protocol is a convention or standard that controls or enables the connection,
communication, and data transfer between two computing endpoints.
Few Protocol Examples:
# Name Short Description Uses
1. IP Internet Protocol The Internet Protocol (IP) is a data-
oriented protocol used for
communicating data across a packet-
switched internet work.
Cyber World – An Overview Page 6 of 31
2. UDP User Datagram
Protocol
User Datagram Protocol (UDP) is one
of the core protocols of the Internet
protocol suite. Using UDP, programs
on networked computers can send
short messages sometimes known as
datagrams (using Datagram Sockets)
to one another. UDP is sometimes
called the Universal Datagram
Protocol.
3. TCP Transmission Control
Protocol
The Transmission Control Protocol
(TCP) is one of the core protocols of
the Internet protocol suite. TCP
provides reliable, in-order delivery of a
stream of bytes, making it suitable for
applications like file transfer and e-
mail.
It is combined with IP referred to as
"the TCP/IP protocol suite."
Cyber World – An Overview Page 7 of 31
4. DHCP Dynamic Host
Configuration Protocol
Dynamic Host Configuration Protocol
(DHCP) is a protocol used by
networked devices (clients) to obtain
IP addresses and other parameters such
as the default gateway, subnet mask,
and IP addresses of DNS servers from
a DHCP server. The DHCP server
ensures that all IP addresses are
unique. IP address pool management
is done by the server and not by a
network administrator. However,
network administrator has to configure
policies as to how these address should
be managed in his network.
5. HTTP Hypertext Transfer
Protocol
HTTP is a request/response protocol
between a client and a server. The
client making an HTTP request - such
as a web browser, spider, or other end-
user tool. The responding server -
which stores or creates resources such
as HTML files and images - is called
the origin server.
6. FTP File Transfer Protocol FTP or File Transfer Protocol is used
to transfer data from one computer to
another over the Internet, or through a
network.
7. Telnet Telnet Remote
Protocol
TELNET
(TELecommunicationNETwork) is a
network protocol used on the Internet
or local area network (LAN)
connections.
Cyber World – An Overview Page 8 of 31
8. SSH Secure Shell Remote
Protocol
Secure Shell or SSH is a network
protocol that allows data to be
exchanged over a secure channel
between two computers. Encryption
provides confidentiality and integrity
of data. SSH uses public-key
cryptography to authenticate the
remote computer and allow the remote
computer to authenticate the user,
9. POP3 Post Office Protocol-3 In computing, local e-mail clients use
the Post Office Protocol version 3
(POP3), an application-layer Internet
standard protocol, to retrieve e-mail
from a remote server over a TCP/IP
connection. Eg: Outlook Express
retrieves emails from Email Server
with help of POP3 Protocol
10. SMTP Simple Mail Transfer
Protocol
Simple Mail Transfer Protocol
(SMTP) is the de facto standard for e-
mail transmissions across the Internet.
2.1. Types of Network classified by geographical area:
2.1.1. PAN
PAN (Personal Area Network): A personal area network (PAN) is a computer
network used for communication among computer devices close to one person.
Some examples of devices that may be used in a PAN are: printers (or WiFi
Printers), fax machines, telephones, PDAs, or scanners. The reach of a PAN is
typically within about 20-30 feet (approximately 4-6 Meters). PANs can be used
for communication among the individual devices (intrapersonal communication).
Typical example is visible in almost all homes that have a broadband &WiFi,
Cyber World – An Overview Page 9 of 31
where devices may be connected through network cable or WiFi. One may also
consider a “Bluetooth” connection use for data/file transfer.
2.1.2. LAN
LAN (Local Area Network): A network covering a small geographic area, like a
home, office, or building. Current LANs are most likely to be based on Ethernet
technology. For example, a library will have a LAN for users to connect to the
internet. LAN may also be used a general term describing a network (with or
without INTERNET access).
2.1.3. CAN
CAN (Campus Area Network): A network that connects two or more LANs but
that is limited to a specific and contiguous geographical area such as a college
campus, industrial complex, or a military base. A CAN, may be considered a
type of MAN (metropolitan area network), but is generally limited to an area that
is smaller than a typical MAN.
2.1.4. MAN
MAN (Metropolitan Area Network): A Metropolitan Area Network is a network
that connects two or more Local Area Networks or Campus Area Networks
together but does not extend beyond the boundaries of the immediate town, city,
or metropolitan area. Multiple routers, switches & hubs are connected to create a
MAN.
2.1.5. WAN
WAN (Wide Area Network): A WAN is a data communications network that
covers a relatively broad geographic area (i.e. one city to another and one
country to another country) and that often uses transmission facilities provided
by common carriers, such as telephone companies. WAN technologies generally
function at the lower three layers of the OSI reference model: the physical layer,
the data link layer, and the network layer.
2.1.6. Special Note:-
When we talk of PAN, LAN, CAN, MAN, WAN, these relate geographical
distances, and refer to INTRANET rather than INTERNET.
INTRANET: A kind of private network, that may be used within the
organization/enterprise only. Eg: An office has two branches, one at Delhi, the
Cyber World – An Overview Page 10 of 31
other at Mumbai. Office computers in these locations would be able to access
the network “Locally”, and may NOT have any access to Internet. Typically
connected on a lease line.
EXTRANET: An Intranet which has a limited connections to other Network.
Eg: A company may give limited access to its external users/clients, but at the
same time, this connection may not be considered as ‘trusted’ from security
point of view. It enables outsiders to work with network (LAN) of an
organization.
2.2. Internet:
2.2.1. Internet: Internet is a worldwide, publicly accessible series of interconnected
computer networks that transmit data by packet switching using the standard
Internet Protocol (IP). It is a "network of networks" that consists of millions of
smaller domestic, academic, business, and government networks, which together
carry various information and services, such as electronic mail, online chat, file
transfer, and the interlinked web pages and other resources of the World Wide
Web.
Depending upon number of computers and kind of complexities involved, it is
broadly divided in two basic reference models:
2.2.1.1. Internet Protocol Suite (IPS)
The Internet protocol suite is the set of communications protocols that
implement the protocol stack on which the Internet and most commercial
networks run. It has also been referred to as the TCP/IP protocol suite,
which is named after two of the most important protocols in it: the
Transmission Control Protocol (TCP) and the Internet Protocol (IP), which
were also the first two networking protocols defined. Today's IP
networking represents a synthesis of two developments that began to
evolve in the 1960s and 1970s, namely LANs (Local Area Networks) and
the Internet, which, together with the invention of the World Wide Web by
Tim Berners-Lee in 1989, have revolutionized computing.
Cyber World – An Overview Page 11 of 31
The Internet Protocol suite—like many protocol suites—can be viewed as a
set of layers. Each layer solves a set of problems involving the transmission
of data, and provides a well-defined service to the upper layer protocols
based on using services from some lower layers. Upper layers are logically
closer to the user and deal with more abstract data, relying on lower layer
protocols to translate data into forms that can eventually be physically
transmitted.
HTTP Application
TCP Transport
IP Network
Ethernet Link
RJ 45 / CAT5 Physical
2.2.1.2. OSI Model / 7-Layer OSI Model
The Open Systems Interconnection Basic Reference Model (OSI Reference
Model or OSI Model for short) is a layered, abstract description for
communications and computer network protocol design. It was developed
as part of the Open Systems Interconnection (OSI) initiative and is
sometimes known as the OSI seven layer model. From top to bottom, the
OSI Model consists of the Application, Presentation, Session, Transport,
Network, Data Link, and Physical layers. A layer is a collection of related
functions that provides services to the layer above it and receives service
from the layer below it. For example, a layer that provides error-free
communications across a network provides the path needed by applications
above it, while it calls the next lower layer to send and receive packets that
make up the contents of the path.
USER (Transmit) USER (Receive)
Layer 7 Application Layer
Layer 6 Presentation Layer
Layer 5 Session Layer
Cyber World – An Overview Page 12 of 31
Layer 4 Transport Layer
Layer 3 Network Layer
Layer 2 Data link Layer
Layer 1 Physical Layer
The 7 Layers of OSI Model
In short, when user wants to connect to a web-server (eg:
www.google.com), he need an application (Internet Explorer / Mozilla
Firefox / Opera Browser etc), common protocol, and a physical link (or
secured link) between two computers. Short definitions/functions are given
in the table below:
Layer Name Description
Layer 7 Application This layer supports application and end-user
processes. Communication partners are
identified, quality of service is identified, user
authentication and privacy are considered, and
any constraints on data syntax are identified.
Everything at this layer is application-specific.
This layer provides application services for file
transfers, e-mail, and other network software
services. Telnet and FTP are applications that
exist entirely in the application level. Tiered
application architectures are part of this layer.
Layer 6 Presentation This layer provides independence from
differences in data representation (e.g.,
encryption) by translating from application to
network format, and vice versa. The
presentation layer works to transform data into
Cyber World – An Overview Page 13 of 31
the form that the application layer can accept.
This layer formats and encrypts data to be sent
across a network, providing freedom from
compatibility problems. It is sometimes called
the syntax layer.
Layer 5 Session This layer establishes, manages and terminates
connections between applications. The session
layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues
between the applications at each end. It deals
with session and connection coordination.
Layer 4 Transport This layer provides transparent transfer of data
between end systems, or hosts, and is
responsible for end-to-end error recovery and
flow control. It ensures complete data transfer.
Layer 3 Network This layer provides switching and routing
technologies, creating logical paths, known as
virtual circuits, for transmitting data from node
to node. Routing and forwarding are functions
of this layer, as well as addressing,
internetworking, error handling, congestion
control and packet sequencing.
Layer 2 Data Link At this layer, data packets are encoded and
decoded into bits. It furnishes transmission
protocol knowledge and management and
handles errors in the physical layer, flow
control and frame synchronization. The data
link layer is divided into two sublayers: The
Media Access Control (MAC) layer and the
Logical Link Control (LLC) layer. The MAC
sublayer controls how a computer on the
network gains access to the data and
permission to transmit it. The LLC layer
Cyber World – An Overview Page 14 of 31
controls frame synchronization, flow control
and error checking.
Layer 1 Physical This layer conveys the bit stream - electrical
impulse, light or radio signal -- through the
network at the electrical and mechanical level.
It provides the hardware means of sending and
receiving data on a carrier, including defining
cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with
physical layer components.
A typical Internet representation, of course searched image over the internet
itself, but seems best way to show picture of INTERNET:
3. Pre-requisites of Internet Connection
3.1. You need to have a computer with Network Card or Telephonic modem or cellular
modem; depending upon type of connection that you plan to take from your ISP
(Internet Service Provider). Network Cards are usually built into your computer
Cyber World – An Overview Page 15 of 31
these days, however, you have to specifically ask for Telephone Modem from your
ISP. It may be built in your laptop, or built-in into your phone / tabs.
3.2. You also need a ‘Internet Service Provider’, and means like balance in your account
to connect to your Internet Service Provider (ISP).
3.3. You need a User Name (Provided by your ISP).
3.4. To avoid someone else use your Internet Plan’s User Name, you need to protect it
with a password. Few ISP may bind themselves to your computer though MAC
address.
3.5. You need to have modem:
3.5.1. Telephonic Modem
3.5.2. DSL Modem
3.5.3. Cable Modem
3.5.4. Cellular Modem (2G/3G/4G)
3.6. You need an application where you can view a website or download information /
data. This is called a Web-browser. Most popular web-browsers:
3.6.1. Internet Explorer: It is a tool, which is provided along with Microsoft
Windows. You can click / double click on the icon for application and type the
website address in the address bar. As it downloads the website information, it
starts displaying the website information in ‘Web-Page Information’
Cyber World – An Overview Page 16 of 31
3.6.2. Mozilla Firefox: Mozilla Firefox is a tool (Web Browser) which also helps in
viewing Website information, however, it is created by an organization which is
‘global community’ and ‘public benefit organization’ dedicated to improve
Internet experience for people everywhere. It has its own unique interface.
However the concept remains the same.
Address Bar
Web-Page
Information
Tabs:
For Web Pages
Favorites - Bar
Menu - Bar
Command - Bar
Search - Bar
Cyber World – An Overview Page 17 of 31
3.6.3. Opera
4. Basic working of ISP
To get Internet access, End user first has to establish a ‘connection’ (or a ‘link’) with ISP
Server. This server then validates you as anauthentic user by first checking if your unique
user name matches with the list that server has; and then the password. If both – your
user name and password matches, then it checks your account validity and if you have
enough balance / permission to use Internet Services (Browsing, downloading etc), you
are then connected to the main stream network, i.e., the mighty INTERNET. This
enables you to make use of Internet Services. It may be noted, that some ISP’s may also
require a Hardware Address of the device being used. This is a form of unique identity
give to Network Card also known as (aka) MAC ID (Machine Identification).
ISP’s mainly provides three several services:
4.1. Post Paid Account: In which users consumes the bytes and then end user is sent an
Invoice/Bill for usage of data.
4.2. Pre-Paid: In this type, the user has to pay in advance, and a certain amount of data
consumption is allowed for a certain time. Which ever consumes first (data or time)
it gets expired.
4.3. Un-limited: These plans are usually expensive than the above two, and may be
offered in both (Post-paid / Pre-paid). This plan is only time bound, and has to be
renewed at certain intervals. There is no limit of data download and upload.
Cyber World – An Overview Page 18 of 31
4.4. Apart from this, ISP’s also provide corporate plans, which are assured with a
minimum down-time. Usually it has 99.9% up time, 24x7, 365days. These may be
dedicated lease lines configured at the corporate / office. There speeds may appear
less as compared to domestic, but since it is a dedicated connection, it sells on
minimum speed of connection provided. Eg: You may easily get a connection at
your home for may be 4Mbps; but this is usually “up-to 4Mbps”, this same band-
width may be share with 2 or more devices at your home/SOHO (Small Office Home
Office). It is assumed that Domestic connections would not require connection at the
same instance. That is why, you may face slower downloads during ‘peak’ hours.
Whereas in corporate connections, one cannot afford slow speed at any time. Thus,
even if ISP provide 2Mbps in corporate, it would be far superior than domestic
connections with 5Mbps (Just a rough estimate).
Downtime: Time when we are not able to use services, eg: If ISP is not able to
provide you INTERNET due to a cable damage / link failure etc.
Mbps: Mega bits per second. Unit used to measure Internet downloads & upload
speeds. Upcomming term is Gbps (Giga bits per second).
5. Connecting to ISP: Since, layout of INTERNET cables would have been a huge
investment, engineers made use of existing cables, i.e., telephone lines which had been
already installed at users end. A device ‘modem’ helps in converting these voice signals
(which are analog) to digital which a computer can understand. It (modem) is capable
converting analog to digital and vice-versa. Now let us discuss about dialup and
broadband setups being commonly used in India:
5.1. Dialup
This has become almost obsolete in metro cities, but uptill recent past, this was the
only way to connect to INTERNET for an ordinary user. To connect to a Dialup
Internet connection, of course, ensure that your computer is on and ready. Your
computer should have a dialup modem and necessary software for modem installed
in your computer.
Cyber World – An Overview Page 19 of 31
Usually your ISP uses your phone number as your user name.You are required to dial
a server’s phone number (through modem), which at server’s end also has a modem.
This connects your computer to ISP Login Server. This is done with help of a special
instrument – Modem. Once initiated, the server gives our computer’s modem a fax
tone. The server then prompts us to input User Name and password. After that the
server knows that you are a valid user, it proceeds further and gives you access to
Internet. However meanwhile you are ‘connected’ to Internet, you are at the same
time being billed for phone talk time. In other words, making Internet connection
gets charged in two ways:
5.1.1. Talk Time. Modem dials the ISP phone number and gets connected. Till the
time it is ‘connected’ to the server, you have to pay as per the call rate.
5.1.2. Net charges: Apart from telephone talk time, we also have to pay for Internet
services, which is the other cost other than the talk time.
Once we are done with our Internet, we can then logout / disconnect. The phone line
now gets free for our normal usage. This modem used to come in both, Internet &
External. Internal modem: The modem that gets pluged into motherboard; or in-built
in laptop; External modem: a small device will have to be placed next to computer
with cables connecting to computer’s COM port.
Advantage: It requires lesser investment in terms of hardware. In earlier times, it
was the cheapest and the only way to get connected.
Cyber World – An Overview Page 20 of 31
Disadvantage: Firstly, we have to pay for both, telephone usage and Internet usage.
Secondly, it was very slow, 24kbps to 54kpbs. Thirdly, one can use it for either one
purpose – phone or Internet purpose. Even if there is a minor disturbance in phone
line, you may never get connected or keep getting disconnected or sometimes it
makes Internet connection very slow. If you are not able to get connected, the
second time you try is basically a second call that you have made. In other words,
each time when you get a Fax Tone, you have called up the server those many times,
this is regardless if you were able to get ‘connected to Internet’ or not. Since now-a-
days almost all telephone exchanges have got digitalized, this technology has become
almost obsolete.
5.2. Broadband: This is the most common form of INTERNET services being used
today.Broadband Internet or Broadband is almost similar in working as a dialup
setup. However, in most of ISPs, you have an option to key-in the user name and
password every time, in other words, just turn on computer and modem, and you are
connected. No hustles of typing your user name password as it is memorized by your
DSL-modem (DSL – Digital Subscriber Line). It is much faster – A conventional
dialup modem may give you speeds up to 54kbps (kilo bits per second), whereas
speed provided by broadband is 64kbps, and can go up to 5Mbps. These days the
most common speeds are 2Mbps and 5Mbps. Small office / home office (SOHO)
usually uses 5Mbps, which is sufficient enough to share Internet connection for up to
10~15 computers. It’s a small device and is connected to splitter at one end, and
usually connected with USB or LAN cable to the computer. Wifi enabled modems
may connect computers wirelessly.
DSL -
Modem
Splitter
Cyber World – An Overview Page 21 of 31
Moreover, we can use our phone line as well as Internet at the same time. They both
use same connection (wires and cables), but with help of splitter and new modem
design, both are treated separately. Both have different accounting, thus your ‘talk-
time’ and ‘Internet Usage’ can be charged as per actual usage of net & use of talk
time separately.
5.2.1. Advantages: Better speed, more stable connection. Easy to use as compared
to telephonic modem ISP. Minimum speed is 64kbps which is faster than Dialup
Modem ISP. Now-a-days, its minimum 1Mbps. One can use phone line and
Internet on the same connection and same ISP.
5.2.2. Disadvantage: The exchange which has to provide service to end user should
be digital. As in some cases it is ‘always on’, one may un-intentionally
download files (Eg: Updates etc that may not be necessary). These factors
accounts for billing factors un-knowingly.
5.3. Cellular: For the users on the go, this is best way to be connected. Like landline
connections requires phone line cables at a fixed place, this uses existing cellular
networks (that are used for mobile phones). The modem may then be connected to
USB port of computer. Users also need a valid and activated “SIM” (Subscriber
Identity Module) with appropriate “Net” plans.
Cyber World – An Overview Page 22 of 31
5.4. Fibre: Fibre optic uses “light” as medium, unlike other technologies which use wires
or air (wifi) as media, fibre uses light. Light plusesare made to travel in an enclosed
glass or fine transparent plastic in which light is emitted from one end and received at
the other. For this a fibre-optic modem is used which translates light impulses to
digital signals and vice-versa, (similar to a modem, which changes electrical analog
signals to digital & vice-versa).
Cellular
Tower
Cyber World – An Overview Page 23 of 31
This type of network is extremely fast, usually starts with 5Mbps and can go up any
limit that we know as of today. Light being the fastest wavelength known to human
kind, it is now used in networking as well.
Pros: The cable does not deteriorates, almost weather proof; as against telephone
cables, which are prone to wear and tear or rusting due to weather conditions. It does
not gets hampered even if it passes near electric cables. Electric cables tends to
interfere with telephone cables due to EMI (Electro-Magnetic interference).
Cons: Though the cable is almost weather resistant, but if bend sharply, it may result
in breakage of glass/fine transparent ‘fibre’. The installation and maintenance is
expensive as tools and spares are not very common.
6. Use of Internet
6.1. The basic purpose of internet:
6.1.1. Information / Knowledge
6.1.1.1. Share Information / data and Access to infinite knowledge: Search
Options eg: www.google.com, www.yahoo.com, www.amazon.com etc.
6.1.1.2. Forums: These are special sites, which are dedicated for discussions.
You may put your query on these websites, and once someone has a
solution, he/she would share that experience/knowledge/solution with you.
6.1.2. Communication
6.1.2.1. E-mail: This has brought a revolution in the way we communicate. It
has almost replaced our existing snail-mail system (the conventional Letter
System). Most of the business, formal or informal communications are
being done through this Electronic Mail.
6.1.2.2. Chats: Used for ‘live’ text communication, this may be used for
business / social purpose. It requires a small tool (software / App) that
enables people to communicate with each other through written text. Few
chat software’s also provide emoticons (graphical representation of moods),
eg: for smile: , for sad:  etc.It may also offer services to exchange
images and/or videos. Difference between ‘online chat’ and email is, that
in chatting both person(s) communicate with each other at the same time in
the same application software, they may be located in any part of world. It
is also important that both person are ‘online’ and logged in at the same
Cyber World – An Overview Page 24 of 31
time so that they can communicate with each other at the same time. They
also need to have same type of tool and a unique user name. Eg: Skype
messenger should be installed on both computers. If one has Viber and
other one has Skype, they will not be able to chat amongst themselves.
6.1.2.3. Video Conferencing: This is an extension of Chat session. Few of the
tools support Live Video to go across. For this both parties should have a
Web-cam, else only one person would be able to view. Ideally, one should
put a opaque tape or paper on the camera to avoid camera being ON un-
intentionally.
6.1.3. Entertainment
6.1.3.1. Book Travel Tickets: You may visit a travel page, and there you will
be able to search best prices for your airfare/railway tickets / bus tickets.
Book hotels, have a preview of rooms that they would offer.
6.1.3.2. Play online-games: There are lot of multi-user games available. We
definitely need a high-speed Internet connection for this as they required to
‘be in touch’ all the time.
6.1.4. Business
6.1.4.1. Advertise: Most of the free Email Providers usually bring in lot of
advertisements. This is needed for them to keep running and maintaining
their servers.
6.1.4.2. Online-Shopping: Now without going to stores, you can find the best
and cheapest items. You can even compare there features. You can go to
online shopping on various sites eg: www.ebay.in, www.indiaplaza.com,
www.rediff.com etc.
6.1.4.3. Online-Banking: Now you can manage your account online as well.
You don’t need to go to bank for most of transactions. Infact, ATMs
(Automatic Teller Machine) and Computer banking (or E-Banking) has
almost made us forget – Who is working in our bank branch. You can go
to any bank and deposit or withdraw money, and the balance is reflected
almost instantly. All these branch computers are actually linked to a central
Bank’s Server Computer. Once they are updated, all that gets reflected in
your respective accounts.
6.1.4.4. Extend your office (or) Access your office computer (with help of
special tools): With help of few tools, you can actually work on your office
Cyber World – An Overview Page 25 of 31
computer without actually being there. All you need is that your office
computer and your computer (from where you wish to work) should have
an Internet access and a computer. It also needs a special application that
enables this possibility and keeps it secured enough. One of example is:
TeamViewer. In order to work, you need to ensure that the application is
installed and running on both the computers. Key in the user Id &
Password of the target computer, and be online. Once the connection is
validated, the end user gets to control the target computer’s keyboard &
mouse.
7. Security of Information
7.1. Since ancient times, it is always very important to secure important information.
There were several ways in which messages were secured. Some of the most
common examples was, When ever any message was sent through a messenger, it
will be sealed by special material like clay etc and will bear the stamp/signature of
King, if found broken, then obviously, the message is tampered or shared with other
person as well. One of other method was to de-crypt information. The messages was
encoded on a strip of cloth. It then was wrapped on a cylinder with specified
diameter. A message was written on it, to make it more complex, further text were
also written so that it makes difficult to make out what was written on it. These two
objects, the cylinder and piece of cloth were sent via different messengers. When it
reached the destination, both had to be combined to read the correct message. See
illustration:
Cyber World – An Overview Page 26 of 31
As you can see in the illustration, it does not reveal message when cloth is spread.
But when it will be wrapped again on same diameter cylinder, one can read the
required message. To make us understand easily, the word “WORLD PEACE” is in
bold. Even today, a similar technology is used to save the original message. It is
wrapped on a special sequence of characters where. This process of making a
message secure is also called as encrypting. When this message is converted in
normal form so that it is easily readable, then this process is called as de-encryption.
8. Type of Threats
The biggest threat to Information stored in a computer is ‘VIRUS’. In Latin, it means
toxic or poison. It is a computer program that can copy itself and infect a computer
without permission or knowledge of user. As common viruses infect people through
some medium like – air, touch, infected blood transmission etc; similarly a Computer
virus also spreads through exchange of information through Floppy, CD media, USB Pen
Drives or Internet (Email, websites, downloads). They may make our computer slow,
freeze it to perform at all or limit computer’s functionality to a few operations, delete data
files, or even leave our computer as ‘Not Bootable’.
There is one more threat which is even more painful and time consuming. A Virus-Hoax.
People in threat of a virus, usually format (Erase everything on a disk) and re-install (Eg:
Operating System Re-install like Windows, Linux etc). This is a lengthy and time-
consuming process. Just imagine a Network Administrator had to re-do the whole Server
Cyber World – An Overview Page 27 of 31
again. This being a major factor in down-time for the users who were trying to access the
Servers.
Despite of various options available, to prevent computer threats, still there are chances of
your computer getting a virus. The best policy is – Prevention is better than cure!
Type of threats:
8.1. Virus: Computer programs that travel through floppy, CDs, Pen Drives, Games
(Usually Demo Versions), Internet.
8.2. Spyware, Malware: It is a computer program that gets installed without true
information/knowledge of the user into a computer and takes partial control of the
computer. They reside in the computer and monitor, collect personal information,
Install additional software, redirecting to any website. ‘Spywares’ usually gets into
computer from websites or ‘Junk’ Emails. One should be very careful in opening
emails, as these emails try to look as original as possible. It may appear as bank
statement / offer letter / upgrades /ATM card pin / etc. Carefully check the spellings
in email address or attached documents. Never ever open attached documents that
have extensions like:
8.2.1. “.exe”
8.2.2. “.com”
8.2.3. “.bat” or “.cmd”
8.2.4. “.docm” or “.xlsm” (Macro files)
8.2.5. Sometimes, it also appears as a “.zip” file.
8.2.6. To identify the above types, it is recommended to change/optimize this setting
in Control Panel Folder optionsView”Un-check on Hide extensions for
known file types”:
Cyber World – An Overview Page 28 of 31
8.3. Rootkit: It is a program (or a combination of programs) designed to take
fundamental control of a computer system, without authorization of user. It may
allow ‘unauthorized users’ to act as system Administrator on your computer; and
thus take full control of your computer system.
8.4. Worm: It is a self-replicating computer program. It usually uses a ‘network’ to send
copies of itself to other computers attached on the same network without informing
the user. They may corrupt files or simply choke the bandwidth (Speed) of network.
8.5. Trojan Horses: A computer program that appears to perform certain action, but in
fact performs some other actions, as a virus would do. Its usually hidden with
another free-ware utility tool. Eg: You may download a free alarm software from a
website. But it actually gets in your computer and destroys your computer files.
8.6. Special note onRansomware: There may be new forms getting evolved time and
again. One of script (kind of malware), encrypts and secure your word, excel
&powerpoint files. It then asks user to pay certain amount at certain account.
Though, there have been instances where only few were lucky to get their data files
back after payment. Till date (October 2016), the only solution to this is backup files
Cyber World – An Overview Page 29 of 31
at regular intervals. Basically it does not allows end user to access his/her own files
unless “Ransom” is paid to ‘them’!
9. Prevention from threats
You can prevent but not avoid virus threats and problems. The best way is to Install a
Good Antivirus Program with all features and keep it updated. -- Why Updated? Let us
understand by an example: You purchased an Antivirus, Anti-Spyware Software on
1.June.2016 and installed it successfully. There are hundreds of Viruses Spywares,
Trojans etc created new on Internet in every 24 hrs. Now, your Antivirus/Anti-spyware
Programs would not be aware of all the viruses, Spyware, Trojans that were created after
1.June.2016. Then how are you protected? - In this situation you are only protected till
you are not attacked by the latest. As per example given in 8.6, page 28, even the
antivirusis un-able to stop or prevent damages in end user computers.
It is very important for anyone who uses his/her computer; to keep their Antivirus/Anti-
Spyware Program updated all the time.
From time to time, Software companies keep on releasing ‘fixes’ and/or ‘updates’. When
any operating system / computer program is written, it comprises of several thousands of
lines of code. There may be some un-thought possibility left while creating that computer
software. Whenever these vulnerable threats are realized, a new revised ‘patch’ (small
software code to fix known problem) is released from the software company. These are
given different names eg: Windows NT Server came with Service Packs (SP1, SP2, SP3
etc). Windows 98 released Windows 98 SE (second edition). Windows XP released
Windows XP SP2 (Service Pack 2), Windows 7 with Service Pack 1. Antivirus release
its new ‘patches’ or ‘updates’ almost daily so that their database of list of viruses and
techniques to handle them is always ready to defend with latest threats.
One should avoid using ‘free’ or ‘trial’ software: simply because they may not be able to
avoid most of the threats and it is never provided with complete functionality. Eg: It may
detect a virus in your computer, but may not ‘remove’ virus from your computer. It puts
you in jeopardy, if you suspect that your computer is infected with virus/malware – then
you should avoid purchase it online as if your computer is ‘hacked’ (someone else
monitoring your personal details or capturing your credit card numbers and password),
you may be in a greater loss by typing your credit card/bank details!!!
One should also avoid use of two different anti viruses at the same time. An Anti virus
resides in special place in memory, similar to a virus most of time.
Cyber World – An Overview Page 30 of 31
One of the Antivirus may always give you ‘false alarms’ of suspicious activity going one
in the computer.
If you are going to do online shopping/ banking, make sure that address in the address-bar
starts with “https://………”. This ensures that you are opening a Secured Website. You
should also ensure that the site has right spellings in the URL (place where we type
address), right spellings in content and proper grammar. Some are also able to ‘fake’
sites (Phishing).
You should never respond to email where someone is asking your bank details and
personal details, unless you are very sure upon it. Banking websites never ask your
personal details unless you are logging into their website.
10. Digital Signatures
The traditional ways used in our common lives are use of stamp and seals. These with
witnesses increase ‘genuineness’ of a document. So that others cannot access this
document, it should be kept in a treasure box or locker. However, even then – these
documents are prone to several threats. Similarly, in computers or cyber space, we can
use digital signature to make our documents secure.
A digital signature is an electronic signature that can be used to authenticate the identity
of the sender of a message or the signer of a document, and possibly to ensure that the
original content of the message or document that has been sent is unchanged. Digital
signatures are easily transportable, cannot be imitated by someone else, and can be
automatically time-stamped. The ability to ensure that the original signed message
arrived; means that the sender cannot easily repudiate it later.
A digital signature can be used with any kind of message, whether it is encrypted or not,
simply so that the receiver can be sure of the sender's identity and that the message
arrived is intact. A digital certificate contains the digital signature of the certificate-
issuing authority so that anyone can verify that the certificate is real.
Let us understand it’s working by an example: Assume you were going to send the draft
of a contract to your lawyer in another town. You want to give your lawyer the assurance
that it was unchanged from what you sent and that it is really from you.
You write the contract in your email. Using special software, you obtain a message hash
(mathematical summary) of the contract. You then use a private key that you have
previously obtained from a public-private key authority to encrypt the hash.
The encrypted hash becomes your digital signature of the message. (Note that it will be
different each time you send a message.) At the other end, your lawyer receives the
Cyber World – An Overview Page 31 of 31
message. To make sure it's intact and from you, your lawyer makes a hash of the
received message. Your lawyer then uses your public key to decrypt the message hash or
summary. If the hashes match, the received message is valid.
11. In end would like to conclude, Cyber Space is like a place that does not exist in real
world, but helps accomplish lot of objectives in real life. It exists somewhere in RAM
and NETWORKS. It requires digital devices to stay connected and work in cyberspace.
It comes with great power, good & bad, and one should refrain sharing personal or private
information on NET (forums/social networking sites etc). Even if shared, one should
check the security settings in respective applications (Apps). One should also refrain
putting comments that may hurt people and/or community or a sect. Once written, it is
very difficult to ‘remove’ from cyberspace.

More Related Content

Similar to Part-A An Overview of Cyber Law.pdf

E content internet
E   content internetE   content internet
E content internet
Kaliyamurthi Punitha Devi
 
Network Notes
Network Notes Network Notes
Network Notes
BOXLIGHT Inc
 
Elements Of Communication
Elements Of CommunicationElements Of Communication
Elements Of Communication
Sheena Crouch
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
MohammedAliShakil
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
MosharafHossen9
 
Internet and Its Uses
Internet and Its UsesInternet and Its Uses
Internet and Its Uses
Sundeep Malik
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
JeremiahJamesNg
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Gorra Narsimhulu
 
COMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdfCOMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdf
GyanendraSingh189549
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway LessonBuffalo Seminary
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
Tallat Satti
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
JafarHussain48
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
ShohanaakterKakon
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
Md. Mashiur Rahman
 
PPt on internet
PPt on internetPPt on internet
PPt on internet
Deepansh Goel
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
New media features
New media featuresNew media features
New media features
Aakanksha Sharma
 
Aayush arora
Aayush aroraAayush arora
Aayush arora
aayushaayusharora
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
Raj Alam
 

Similar to Part-A An Overview of Cyber Law.pdf (20)

E content internet
E   content internetE   content internet
E content internet
 
Network Notes
Network Notes Network Notes
Network Notes
 
Elements Of Communication
Elements Of CommunicationElements Of Communication
Elements Of Communication
 
E_commerce_chap_2.pptx
E_commerce_chap_2.pptxE_commerce_chap_2.pptx
E_commerce_chap_2.pptx
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 
Internet and Its Uses
Internet and Its UsesInternet and Its Uses
Internet and Its Uses
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
 
COMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdfCOMPUTER NETWORKS NOTES.pdf
COMPUTER NETWORKS NOTES.pdf
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
PPt on internet
PPt on internetPPt on internet
PPt on internet
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
New media features
New media featuresNew media features
New media features
 
Aayush arora
Aayush aroraAayush arora
Aayush arora
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 

Recently uploaded

Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 

Recently uploaded (20)

Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 

Part-A An Overview of Cyber Law.pdf

  • 1. Online Certificate Course on Cyber Law Paper – I Introduction to the Cyber World and Cyber Law Part A Cyber World – An Overview For THE INDIAN LAW INSTITUTE (Deemed University) Bhagwandas Road New Delhi - 110001
  • 2. Cyber World – An Overview Page 2 of 31 Table of contents Topics Page 1. Cyber World: An Overview 1.1. Understanding the scope of computers in our daily life 1.2. Basic / Fundamental Principle of computer 1.3. The “E” Zone 1.4. Where did the computer come from 2. What is a computer Network? 3. Pre-requisites of Internet Connection 4. Basic working of ISP 5. Connecting to ISP 5.1. Dialup 5.2. Broadband 5.3. Cellular 5.4. Fibre 6. Use of Internet 7. Security of Information 8. Type of Threats 9. Prevention from threats 10. Digital Signatures 3 3 3 3 4 5 14 17 18 18 20 21 22 23 25 26 29 30 This paper provides an overview of cyber world with reference to- • The Internet and online resources • Security of Information • Digital Signature Revision 1.
  • 3. Cyber World – An Overview Page 3 of 31 1. Cyber World: An Overview 1.1. Understanding the scope of computers in our daily life There is no doubt, that in today’s world, computer are used everywhere, when we mean everywhere, it could be your local shopping center, computer center, be it your railway reservations, airlines reservation, micro-wave ovens, even your phones. Institutions like banks, not only ease the use of banking functions, but also give us flexibility to bank from virtually anywhere. With a swipe from your plastic money (Debit/Credit Cards), it fetches balance information from your bank’s account and there you go, you just purchased the commodity without even bothering, how many gadgets, complex security codes went through and helped you to purchase. 1.2. Basic / Fundamental Principle of computer A computer receives an INPUT, then it PROCESSES it, and then gives OUTPUT. When they (electronic gadgets) receive an input, they definitely give an output after some calculations, whether we realize immediately or later. Eg: Employees in an organization would enter their attendance, and upon request at end of month to computer, it immediately generates salary slip based on the attendance. On other hand, there can be an instant output; like when you type anything on keyboard, it gets displayed immediately on your screen in respective application software! 1.3. The “E” Zone There could be numerous such examples where our life has been attached with ‘e’. Be it mail that got converted to e-mail, your banking became e-banking, commerce became e-commerce, and so on. This ‘e-’ stands for Electronics. Now that makes better sense when “Electronic” is prefixed like:- Electronic mail called as E-Mail. Electronic Banking called as E-Banking etc. When we speak of Cyber, it is a prefix, derived from cybernetics (a Greek word meaning "the art of steering"), used to describe the entire range of things made available through the use of a computer. It does not exist in physical boundaries. Earlier the term ‘cyber’ was used in fiction stories, but now it is used commonly. For example: cyber-phobia is an irrational fear of computers, cyberspace is the virtual (nonphysical) space created by computer systems. Something like we talk about fairy tales or dreams, they don’t exist, but a nightmare can certainly wake you up in middle of night.
  • 4. Cyber World – An Overview Page 4 of 31 But when we talk about some terms like cyber-space in terms of our scope, we combine not only the humans, computers (hardware and/or software), but also to the extent that one (computer) is almost capable to do that. It would include your mobile phones, gaming gadgets like Play station, X-box, smart watches etc. Mostly, whenever cyber is used, term is associated with science fiction, as simply as a computer is not capable of thinking. However, it is used in most of activities like booking tickets, tours, communicating with people through virtual world; you never know who really is on the other side, unless met him/her. 1.4. Where did the computer come from Necessity is the mother of invention and un-fortunately, the computers are invention of Cold Wars. In beginning, they were humongous, very large in size, would cover a size of a football ground, and may be bigger. It used to consume power that would in today’s world give electricity to one colony in itself! But as computers can be trusted more for efficiency than humans if we give a repeated task, it definitely supersedes humans in certain areas. As a matter of fact, they instate discipline in work. One has to follow certain guidelines to attain a job done from computers. Let us take a small example, when banking was done manually, Customers could have a ‘personal influence’ on the banker or bank manager, the customer was informed over the phone before actually taking an action. But since computers are in place, it would work irrationally even if it’s a new customer, or old or his relative. I’m sure, flight bookings and their management couldn’t have been better as we have the facility to book, tickets, get best fares, compare with various online agents (websites). This facility is not only extended to our computers at home, but also extended to our mobile phones which is capable of connect to ‘network’ anytime & almost anywhere. Moreover, the art of communication has become so advanced and easy to reach, it helps in transfer of information / data from any place (device) to any place (device). Gone are the days when one had to make a school projects, business presentations, now-a-days, one can search projects, themes and then continue to add wings to one’s concept.
  • 5. Cyber World – An Overview Page 5 of 31 2. What is a computer Network? Computer Network: To be able to communicate and share resources (knowledge or information, hardware equipments, software etc) between two or more computers. One just has to ‘share’ the equipment/information, and it becomes available to others. Telephones were the one of the first electronic gadgets, which helped humans to interact with each other. However, it could only send voices across. One would have to dial the desired phone number and have conversation. There was one more invention – Radio. But it could communicate only one-way. We may not put radio and television in category of communication. And Cyber Space – one of the best and economic way to bridge gap between each other, it is irrespective of physical boundaries and distances. Have you ever imagined, that if a person in country “A” makes a call to another country “B”, the call has to go through various networks of telephone exchanges, however when you speak from here, the other person (if both use same language to communicate) is also able to hear and respond accordingly. This is irrespective of the path that it took. This happens because even if they use different machines / gadgets, they have to follow same set of rules, just like on road, one has to follow traffic rules to avoid chaos, and it does not depend on which vehicle you are driving. Similarly, in computer networking, there are a few standard sets of rules which both (or more than two) have to follow if they want to ‘network’ with each other. These set of rules are also called as Protocol. Protocol: A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. Few Protocol Examples: # Name Short Description Uses 1. IP Internet Protocol The Internet Protocol (IP) is a data- oriented protocol used for communicating data across a packet- switched internet work.
  • 6. Cyber World – An Overview Page 6 of 31 2. UDP User Datagram Protocol User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal Datagram Protocol. 3. TCP Transmission Control Protocol The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it suitable for applications like file transfer and e- mail. It is combined with IP referred to as "the TCP/IP protocol suite."
  • 7. Cyber World – An Overview Page 7 of 31 4. DHCP Dynamic Host Configuration Protocol Dynamic Host Configuration Protocol (DHCP) is a protocol used by networked devices (clients) to obtain IP addresses and other parameters such as the default gateway, subnet mask, and IP addresses of DNS servers from a DHCP server. The DHCP server ensures that all IP addresses are unique. IP address pool management is done by the server and not by a network administrator. However, network administrator has to configure policies as to how these address should be managed in his network. 5. HTTP Hypertext Transfer Protocol HTTP is a request/response protocol between a client and a server. The client making an HTTP request - such as a web browser, spider, or other end- user tool. The responding server - which stores or creates resources such as HTML files and images - is called the origin server. 6. FTP File Transfer Protocol FTP or File Transfer Protocol is used to transfer data from one computer to another over the Internet, or through a network. 7. Telnet Telnet Remote Protocol TELNET (TELecommunicationNETwork) is a network protocol used on the Internet or local area network (LAN) connections.
  • 8. Cyber World – An Overview Page 8 of 31 8. SSH Secure Shell Remote Protocol Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, 9. POP3 Post Office Protocol-3 In computing, local e-mail clients use the Post Office Protocol version 3 (POP3), an application-layer Internet standard protocol, to retrieve e-mail from a remote server over a TCP/IP connection. Eg: Outlook Express retrieves emails from Email Server with help of POP3 Protocol 10. SMTP Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) is the de facto standard for e- mail transmissions across the Internet. 2.1. Types of Network classified by geographical area: 2.1.1. PAN PAN (Personal Area Network): A personal area network (PAN) is a computer network used for communication among computer devices close to one person. Some examples of devices that may be used in a PAN are: printers (or WiFi Printers), fax machines, telephones, PDAs, or scanners. The reach of a PAN is typically within about 20-30 feet (approximately 4-6 Meters). PANs can be used for communication among the individual devices (intrapersonal communication). Typical example is visible in almost all homes that have a broadband &WiFi,
  • 9. Cyber World – An Overview Page 9 of 31 where devices may be connected through network cable or WiFi. One may also consider a “Bluetooth” connection use for data/file transfer. 2.1.2. LAN LAN (Local Area Network): A network covering a small geographic area, like a home, office, or building. Current LANs are most likely to be based on Ethernet technology. For example, a library will have a LAN for users to connect to the internet. LAN may also be used a general term describing a network (with or without INTERNET access). 2.1.3. CAN CAN (Campus Area Network): A network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. A CAN, may be considered a type of MAN (metropolitan area network), but is generally limited to an area that is smaller than a typical MAN. 2.1.4. MAN MAN (Metropolitan Area Network): A Metropolitan Area Network is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are connected to create a MAN. 2.1.5. WAN WAN (Wide Area Network): A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. 2.1.6. Special Note:- When we talk of PAN, LAN, CAN, MAN, WAN, these relate geographical distances, and refer to INTRANET rather than INTERNET. INTRANET: A kind of private network, that may be used within the organization/enterprise only. Eg: An office has two branches, one at Delhi, the
  • 10. Cyber World – An Overview Page 10 of 31 other at Mumbai. Office computers in these locations would be able to access the network “Locally”, and may NOT have any access to Internet. Typically connected on a lease line. EXTRANET: An Intranet which has a limited connections to other Network. Eg: A company may give limited access to its external users/clients, but at the same time, this connection may not be considered as ‘trusted’ from security point of view. It enables outsiders to work with network (LAN) of an organization. 2.2. Internet: 2.2.1. Internet: Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web. Depending upon number of computers and kind of complexities involved, it is broadly divided in two basic reference models: 2.2.1.1. Internet Protocol Suite (IPS) The Internet protocol suite is the set of communications protocols that implement the protocol stack on which the Internet and most commercial networks run. It has also been referred to as the TCP/IP protocol suite, which is named after two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two networking protocols defined. Today's IP networking represents a synthesis of two developments that began to evolve in the 1960s and 1970s, namely LANs (Local Area Networks) and the Internet, which, together with the invention of the World Wide Web by Tim Berners-Lee in 1989, have revolutionized computing.
  • 11. Cyber World – An Overview Page 11 of 31 The Internet Protocol suite—like many protocol suites—can be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. HTTP Application TCP Transport IP Network Ethernet Link RJ 45 / CAT5 Physical 2.2.1.2. OSI Model / 7-Layer OSI Model The Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model for short) is a layered, abstract description for communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI) initiative and is sometimes known as the OSI seven layer model. From top to bottom, the OSI Model consists of the Application, Presentation, Session, Transport, Network, Data Link, and Physical layers. A layer is a collection of related functions that provides services to the layer above it and receives service from the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path. USER (Transmit) USER (Receive) Layer 7 Application Layer Layer 6 Presentation Layer Layer 5 Session Layer
  • 12. Cyber World – An Overview Page 12 of 31 Layer 4 Transport Layer Layer 3 Network Layer Layer 2 Data link Layer Layer 1 Physical Layer The 7 Layers of OSI Model In short, when user wants to connect to a web-server (eg: www.google.com), he need an application (Internet Explorer / Mozilla Firefox / Opera Browser etc), common protocol, and a physical link (or secured link) between two computers. Short definitions/functions are given in the table below: Layer Name Description Layer 7 Application This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. Layer 6 Presentation This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into
  • 13. Cyber World – An Overview Page 13 of 31 the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. Layer 5 Session This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. Layer 4 Transport This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. Layer 3 Network This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Layer 2 Data Link At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sublayers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sublayer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer
  • 14. Cyber World – An Overview Page 14 of 31 controls frame synchronization, flow control and error checking. Layer 1 Physical This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. A typical Internet representation, of course searched image over the internet itself, but seems best way to show picture of INTERNET: 3. Pre-requisites of Internet Connection 3.1. You need to have a computer with Network Card or Telephonic modem or cellular modem; depending upon type of connection that you plan to take from your ISP (Internet Service Provider). Network Cards are usually built into your computer
  • 15. Cyber World – An Overview Page 15 of 31 these days, however, you have to specifically ask for Telephone Modem from your ISP. It may be built in your laptop, or built-in into your phone / tabs. 3.2. You also need a ‘Internet Service Provider’, and means like balance in your account to connect to your Internet Service Provider (ISP). 3.3. You need a User Name (Provided by your ISP). 3.4. To avoid someone else use your Internet Plan’s User Name, you need to protect it with a password. Few ISP may bind themselves to your computer though MAC address. 3.5. You need to have modem: 3.5.1. Telephonic Modem 3.5.2. DSL Modem 3.5.3. Cable Modem 3.5.4. Cellular Modem (2G/3G/4G) 3.6. You need an application where you can view a website or download information / data. This is called a Web-browser. Most popular web-browsers: 3.6.1. Internet Explorer: It is a tool, which is provided along with Microsoft Windows. You can click / double click on the icon for application and type the website address in the address bar. As it downloads the website information, it starts displaying the website information in ‘Web-Page Information’
  • 16. Cyber World – An Overview Page 16 of 31 3.6.2. Mozilla Firefox: Mozilla Firefox is a tool (Web Browser) which also helps in viewing Website information, however, it is created by an organization which is ‘global community’ and ‘public benefit organization’ dedicated to improve Internet experience for people everywhere. It has its own unique interface. However the concept remains the same. Address Bar Web-Page Information Tabs: For Web Pages Favorites - Bar Menu - Bar Command - Bar Search - Bar
  • 17. Cyber World – An Overview Page 17 of 31 3.6.3. Opera 4. Basic working of ISP To get Internet access, End user first has to establish a ‘connection’ (or a ‘link’) with ISP Server. This server then validates you as anauthentic user by first checking if your unique user name matches with the list that server has; and then the password. If both – your user name and password matches, then it checks your account validity and if you have enough balance / permission to use Internet Services (Browsing, downloading etc), you are then connected to the main stream network, i.e., the mighty INTERNET. This enables you to make use of Internet Services. It may be noted, that some ISP’s may also require a Hardware Address of the device being used. This is a form of unique identity give to Network Card also known as (aka) MAC ID (Machine Identification). ISP’s mainly provides three several services: 4.1. Post Paid Account: In which users consumes the bytes and then end user is sent an Invoice/Bill for usage of data. 4.2. Pre-Paid: In this type, the user has to pay in advance, and a certain amount of data consumption is allowed for a certain time. Which ever consumes first (data or time) it gets expired. 4.3. Un-limited: These plans are usually expensive than the above two, and may be offered in both (Post-paid / Pre-paid). This plan is only time bound, and has to be renewed at certain intervals. There is no limit of data download and upload.
  • 18. Cyber World – An Overview Page 18 of 31 4.4. Apart from this, ISP’s also provide corporate plans, which are assured with a minimum down-time. Usually it has 99.9% up time, 24x7, 365days. These may be dedicated lease lines configured at the corporate / office. There speeds may appear less as compared to domestic, but since it is a dedicated connection, it sells on minimum speed of connection provided. Eg: You may easily get a connection at your home for may be 4Mbps; but this is usually “up-to 4Mbps”, this same band- width may be share with 2 or more devices at your home/SOHO (Small Office Home Office). It is assumed that Domestic connections would not require connection at the same instance. That is why, you may face slower downloads during ‘peak’ hours. Whereas in corporate connections, one cannot afford slow speed at any time. Thus, even if ISP provide 2Mbps in corporate, it would be far superior than domestic connections with 5Mbps (Just a rough estimate). Downtime: Time when we are not able to use services, eg: If ISP is not able to provide you INTERNET due to a cable damage / link failure etc. Mbps: Mega bits per second. Unit used to measure Internet downloads & upload speeds. Upcomming term is Gbps (Giga bits per second). 5. Connecting to ISP: Since, layout of INTERNET cables would have been a huge investment, engineers made use of existing cables, i.e., telephone lines which had been already installed at users end. A device ‘modem’ helps in converting these voice signals (which are analog) to digital which a computer can understand. It (modem) is capable converting analog to digital and vice-versa. Now let us discuss about dialup and broadband setups being commonly used in India: 5.1. Dialup This has become almost obsolete in metro cities, but uptill recent past, this was the only way to connect to INTERNET for an ordinary user. To connect to a Dialup Internet connection, of course, ensure that your computer is on and ready. Your computer should have a dialup modem and necessary software for modem installed in your computer.
  • 19. Cyber World – An Overview Page 19 of 31 Usually your ISP uses your phone number as your user name.You are required to dial a server’s phone number (through modem), which at server’s end also has a modem. This connects your computer to ISP Login Server. This is done with help of a special instrument – Modem. Once initiated, the server gives our computer’s modem a fax tone. The server then prompts us to input User Name and password. After that the server knows that you are a valid user, it proceeds further and gives you access to Internet. However meanwhile you are ‘connected’ to Internet, you are at the same time being billed for phone talk time. In other words, making Internet connection gets charged in two ways: 5.1.1. Talk Time. Modem dials the ISP phone number and gets connected. Till the time it is ‘connected’ to the server, you have to pay as per the call rate. 5.1.2. Net charges: Apart from telephone talk time, we also have to pay for Internet services, which is the other cost other than the talk time. Once we are done with our Internet, we can then logout / disconnect. The phone line now gets free for our normal usage. This modem used to come in both, Internet & External. Internal modem: The modem that gets pluged into motherboard; or in-built in laptop; External modem: a small device will have to be placed next to computer with cables connecting to computer’s COM port. Advantage: It requires lesser investment in terms of hardware. In earlier times, it was the cheapest and the only way to get connected.
  • 20. Cyber World – An Overview Page 20 of 31 Disadvantage: Firstly, we have to pay for both, telephone usage and Internet usage. Secondly, it was very slow, 24kbps to 54kpbs. Thirdly, one can use it for either one purpose – phone or Internet purpose. Even if there is a minor disturbance in phone line, you may never get connected or keep getting disconnected or sometimes it makes Internet connection very slow. If you are not able to get connected, the second time you try is basically a second call that you have made. In other words, each time when you get a Fax Tone, you have called up the server those many times, this is regardless if you were able to get ‘connected to Internet’ or not. Since now-a- days almost all telephone exchanges have got digitalized, this technology has become almost obsolete. 5.2. Broadband: This is the most common form of INTERNET services being used today.Broadband Internet or Broadband is almost similar in working as a dialup setup. However, in most of ISPs, you have an option to key-in the user name and password every time, in other words, just turn on computer and modem, and you are connected. No hustles of typing your user name password as it is memorized by your DSL-modem (DSL – Digital Subscriber Line). It is much faster – A conventional dialup modem may give you speeds up to 54kbps (kilo bits per second), whereas speed provided by broadband is 64kbps, and can go up to 5Mbps. These days the most common speeds are 2Mbps and 5Mbps. Small office / home office (SOHO) usually uses 5Mbps, which is sufficient enough to share Internet connection for up to 10~15 computers. It’s a small device and is connected to splitter at one end, and usually connected with USB or LAN cable to the computer. Wifi enabled modems may connect computers wirelessly. DSL - Modem Splitter
  • 21. Cyber World – An Overview Page 21 of 31 Moreover, we can use our phone line as well as Internet at the same time. They both use same connection (wires and cables), but with help of splitter and new modem design, both are treated separately. Both have different accounting, thus your ‘talk- time’ and ‘Internet Usage’ can be charged as per actual usage of net & use of talk time separately. 5.2.1. Advantages: Better speed, more stable connection. Easy to use as compared to telephonic modem ISP. Minimum speed is 64kbps which is faster than Dialup Modem ISP. Now-a-days, its minimum 1Mbps. One can use phone line and Internet on the same connection and same ISP. 5.2.2. Disadvantage: The exchange which has to provide service to end user should be digital. As in some cases it is ‘always on’, one may un-intentionally download files (Eg: Updates etc that may not be necessary). These factors accounts for billing factors un-knowingly. 5.3. Cellular: For the users on the go, this is best way to be connected. Like landline connections requires phone line cables at a fixed place, this uses existing cellular networks (that are used for mobile phones). The modem may then be connected to USB port of computer. Users also need a valid and activated “SIM” (Subscriber Identity Module) with appropriate “Net” plans.
  • 22. Cyber World – An Overview Page 22 of 31 5.4. Fibre: Fibre optic uses “light” as medium, unlike other technologies which use wires or air (wifi) as media, fibre uses light. Light plusesare made to travel in an enclosed glass or fine transparent plastic in which light is emitted from one end and received at the other. For this a fibre-optic modem is used which translates light impulses to digital signals and vice-versa, (similar to a modem, which changes electrical analog signals to digital & vice-versa). Cellular Tower
  • 23. Cyber World – An Overview Page 23 of 31 This type of network is extremely fast, usually starts with 5Mbps and can go up any limit that we know as of today. Light being the fastest wavelength known to human kind, it is now used in networking as well. Pros: The cable does not deteriorates, almost weather proof; as against telephone cables, which are prone to wear and tear or rusting due to weather conditions. It does not gets hampered even if it passes near electric cables. Electric cables tends to interfere with telephone cables due to EMI (Electro-Magnetic interference). Cons: Though the cable is almost weather resistant, but if bend sharply, it may result in breakage of glass/fine transparent ‘fibre’. The installation and maintenance is expensive as tools and spares are not very common. 6. Use of Internet 6.1. The basic purpose of internet: 6.1.1. Information / Knowledge 6.1.1.1. Share Information / data and Access to infinite knowledge: Search Options eg: www.google.com, www.yahoo.com, www.amazon.com etc. 6.1.1.2. Forums: These are special sites, which are dedicated for discussions. You may put your query on these websites, and once someone has a solution, he/she would share that experience/knowledge/solution with you. 6.1.2. Communication 6.1.2.1. E-mail: This has brought a revolution in the way we communicate. It has almost replaced our existing snail-mail system (the conventional Letter System). Most of the business, formal or informal communications are being done through this Electronic Mail. 6.1.2.2. Chats: Used for ‘live’ text communication, this may be used for business / social purpose. It requires a small tool (software / App) that enables people to communicate with each other through written text. Few chat software’s also provide emoticons (graphical representation of moods), eg: for smile: , for sad:  etc.It may also offer services to exchange images and/or videos. Difference between ‘online chat’ and email is, that in chatting both person(s) communicate with each other at the same time in the same application software, they may be located in any part of world. It is also important that both person are ‘online’ and logged in at the same
  • 24. Cyber World – An Overview Page 24 of 31 time so that they can communicate with each other at the same time. They also need to have same type of tool and a unique user name. Eg: Skype messenger should be installed on both computers. If one has Viber and other one has Skype, they will not be able to chat amongst themselves. 6.1.2.3. Video Conferencing: This is an extension of Chat session. Few of the tools support Live Video to go across. For this both parties should have a Web-cam, else only one person would be able to view. Ideally, one should put a opaque tape or paper on the camera to avoid camera being ON un- intentionally. 6.1.3. Entertainment 6.1.3.1. Book Travel Tickets: You may visit a travel page, and there you will be able to search best prices for your airfare/railway tickets / bus tickets. Book hotels, have a preview of rooms that they would offer. 6.1.3.2. Play online-games: There are lot of multi-user games available. We definitely need a high-speed Internet connection for this as they required to ‘be in touch’ all the time. 6.1.4. Business 6.1.4.1. Advertise: Most of the free Email Providers usually bring in lot of advertisements. This is needed for them to keep running and maintaining their servers. 6.1.4.2. Online-Shopping: Now without going to stores, you can find the best and cheapest items. You can even compare there features. You can go to online shopping on various sites eg: www.ebay.in, www.indiaplaza.com, www.rediff.com etc. 6.1.4.3. Online-Banking: Now you can manage your account online as well. You don’t need to go to bank for most of transactions. Infact, ATMs (Automatic Teller Machine) and Computer banking (or E-Banking) has almost made us forget – Who is working in our bank branch. You can go to any bank and deposit or withdraw money, and the balance is reflected almost instantly. All these branch computers are actually linked to a central Bank’s Server Computer. Once they are updated, all that gets reflected in your respective accounts. 6.1.4.4. Extend your office (or) Access your office computer (with help of special tools): With help of few tools, you can actually work on your office
  • 25. Cyber World – An Overview Page 25 of 31 computer without actually being there. All you need is that your office computer and your computer (from where you wish to work) should have an Internet access and a computer. It also needs a special application that enables this possibility and keeps it secured enough. One of example is: TeamViewer. In order to work, you need to ensure that the application is installed and running on both the computers. Key in the user Id & Password of the target computer, and be online. Once the connection is validated, the end user gets to control the target computer’s keyboard & mouse. 7. Security of Information 7.1. Since ancient times, it is always very important to secure important information. There were several ways in which messages were secured. Some of the most common examples was, When ever any message was sent through a messenger, it will be sealed by special material like clay etc and will bear the stamp/signature of King, if found broken, then obviously, the message is tampered or shared with other person as well. One of other method was to de-crypt information. The messages was encoded on a strip of cloth. It then was wrapped on a cylinder with specified diameter. A message was written on it, to make it more complex, further text were also written so that it makes difficult to make out what was written on it. These two objects, the cylinder and piece of cloth were sent via different messengers. When it reached the destination, both had to be combined to read the correct message. See illustration:
  • 26. Cyber World – An Overview Page 26 of 31 As you can see in the illustration, it does not reveal message when cloth is spread. But when it will be wrapped again on same diameter cylinder, one can read the required message. To make us understand easily, the word “WORLD PEACE” is in bold. Even today, a similar technology is used to save the original message. It is wrapped on a special sequence of characters where. This process of making a message secure is also called as encrypting. When this message is converted in normal form so that it is easily readable, then this process is called as de-encryption. 8. Type of Threats The biggest threat to Information stored in a computer is ‘VIRUS’. In Latin, it means toxic or poison. It is a computer program that can copy itself and infect a computer without permission or knowledge of user. As common viruses infect people through some medium like – air, touch, infected blood transmission etc; similarly a Computer virus also spreads through exchange of information through Floppy, CD media, USB Pen Drives or Internet (Email, websites, downloads). They may make our computer slow, freeze it to perform at all or limit computer’s functionality to a few operations, delete data files, or even leave our computer as ‘Not Bootable’. There is one more threat which is even more painful and time consuming. A Virus-Hoax. People in threat of a virus, usually format (Erase everything on a disk) and re-install (Eg: Operating System Re-install like Windows, Linux etc). This is a lengthy and time- consuming process. Just imagine a Network Administrator had to re-do the whole Server
  • 27. Cyber World – An Overview Page 27 of 31 again. This being a major factor in down-time for the users who were trying to access the Servers. Despite of various options available, to prevent computer threats, still there are chances of your computer getting a virus. The best policy is – Prevention is better than cure! Type of threats: 8.1. Virus: Computer programs that travel through floppy, CDs, Pen Drives, Games (Usually Demo Versions), Internet. 8.2. Spyware, Malware: It is a computer program that gets installed without true information/knowledge of the user into a computer and takes partial control of the computer. They reside in the computer and monitor, collect personal information, Install additional software, redirecting to any website. ‘Spywares’ usually gets into computer from websites or ‘Junk’ Emails. One should be very careful in opening emails, as these emails try to look as original as possible. It may appear as bank statement / offer letter / upgrades /ATM card pin / etc. Carefully check the spellings in email address or attached documents. Never ever open attached documents that have extensions like: 8.2.1. “.exe” 8.2.2. “.com” 8.2.3. “.bat” or “.cmd” 8.2.4. “.docm” or “.xlsm” (Macro files) 8.2.5. Sometimes, it also appears as a “.zip” file. 8.2.6. To identify the above types, it is recommended to change/optimize this setting in Control Panel Folder optionsView”Un-check on Hide extensions for known file types”:
  • 28. Cyber World – An Overview Page 28 of 31 8.3. Rootkit: It is a program (or a combination of programs) designed to take fundamental control of a computer system, without authorization of user. It may allow ‘unauthorized users’ to act as system Administrator on your computer; and thus take full control of your computer system. 8.4. Worm: It is a self-replicating computer program. It usually uses a ‘network’ to send copies of itself to other computers attached on the same network without informing the user. They may corrupt files or simply choke the bandwidth (Speed) of network. 8.5. Trojan Horses: A computer program that appears to perform certain action, but in fact performs some other actions, as a virus would do. Its usually hidden with another free-ware utility tool. Eg: You may download a free alarm software from a website. But it actually gets in your computer and destroys your computer files. 8.6. Special note onRansomware: There may be new forms getting evolved time and again. One of script (kind of malware), encrypts and secure your word, excel &powerpoint files. It then asks user to pay certain amount at certain account. Though, there have been instances where only few were lucky to get their data files back after payment. Till date (October 2016), the only solution to this is backup files
  • 29. Cyber World – An Overview Page 29 of 31 at regular intervals. Basically it does not allows end user to access his/her own files unless “Ransom” is paid to ‘them’! 9. Prevention from threats You can prevent but not avoid virus threats and problems. The best way is to Install a Good Antivirus Program with all features and keep it updated. -- Why Updated? Let us understand by an example: You purchased an Antivirus, Anti-Spyware Software on 1.June.2016 and installed it successfully. There are hundreds of Viruses Spywares, Trojans etc created new on Internet in every 24 hrs. Now, your Antivirus/Anti-spyware Programs would not be aware of all the viruses, Spyware, Trojans that were created after 1.June.2016. Then how are you protected? - In this situation you are only protected till you are not attacked by the latest. As per example given in 8.6, page 28, even the antivirusis un-able to stop or prevent damages in end user computers. It is very important for anyone who uses his/her computer; to keep their Antivirus/Anti- Spyware Program updated all the time. From time to time, Software companies keep on releasing ‘fixes’ and/or ‘updates’. When any operating system / computer program is written, it comprises of several thousands of lines of code. There may be some un-thought possibility left while creating that computer software. Whenever these vulnerable threats are realized, a new revised ‘patch’ (small software code to fix known problem) is released from the software company. These are given different names eg: Windows NT Server came with Service Packs (SP1, SP2, SP3 etc). Windows 98 released Windows 98 SE (second edition). Windows XP released Windows XP SP2 (Service Pack 2), Windows 7 with Service Pack 1. Antivirus release its new ‘patches’ or ‘updates’ almost daily so that their database of list of viruses and techniques to handle them is always ready to defend with latest threats. One should avoid using ‘free’ or ‘trial’ software: simply because they may not be able to avoid most of the threats and it is never provided with complete functionality. Eg: It may detect a virus in your computer, but may not ‘remove’ virus from your computer. It puts you in jeopardy, if you suspect that your computer is infected with virus/malware – then you should avoid purchase it online as if your computer is ‘hacked’ (someone else monitoring your personal details or capturing your credit card numbers and password), you may be in a greater loss by typing your credit card/bank details!!! One should also avoid use of two different anti viruses at the same time. An Anti virus resides in special place in memory, similar to a virus most of time.
  • 30. Cyber World – An Overview Page 30 of 31 One of the Antivirus may always give you ‘false alarms’ of suspicious activity going one in the computer. If you are going to do online shopping/ banking, make sure that address in the address-bar starts with “https://………”. This ensures that you are opening a Secured Website. You should also ensure that the site has right spellings in the URL (place where we type address), right spellings in content and proper grammar. Some are also able to ‘fake’ sites (Phishing). You should never respond to email where someone is asking your bank details and personal details, unless you are very sure upon it. Banking websites never ask your personal details unless you are logging into their website. 10. Digital Signatures The traditional ways used in our common lives are use of stamp and seals. These with witnesses increase ‘genuineness’ of a document. So that others cannot access this document, it should be kept in a treasure box or locker. However, even then – these documents are prone to several threats. Similarly, in computers or cyber space, we can use digital signature to make our documents secure. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived; means that the sender cannot easily repudiate it later. A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived is intact. A digital certificate contains the digital signature of the certificate- issuing authority so that anyone can verify that the certificate is real. Let us understand it’s working by an example: Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it is really from you. You write the contract in your email. Using special software, you obtain a message hash (mathematical summary) of the contract. You then use a private key that you have previously obtained from a public-private key authority to encrypt the hash. The encrypted hash becomes your digital signature of the message. (Note that it will be different each time you send a message.) At the other end, your lawyer receives the
  • 31. Cyber World – An Overview Page 31 of 31 message. To make sure it's intact and from you, your lawyer makes a hash of the received message. Your lawyer then uses your public key to decrypt the message hash or summary. If the hashes match, the received message is valid. 11. In end would like to conclude, Cyber Space is like a place that does not exist in real world, but helps accomplish lot of objectives in real life. It exists somewhere in RAM and NETWORKS. It requires digital devices to stay connected and work in cyberspace. It comes with great power, good & bad, and one should refrain sharing personal or private information on NET (forums/social networking sites etc). Even if shared, one should check the security settings in respective applications (Apps). One should also refrain putting comments that may hurt people and/or community or a sect. Once written, it is very difficult to ‘remove’ from cyberspace.