• 1. Cyberspace
    • [[#1. Cyberspace#1.1 Definition|1.1 Definition]]
      • [[#1.1 Definition#Key Characteristics of Cyberspace|Key Characteristics of Cyberspace]]
      • [[#1.1 Definition#Components of Cyberspace|Components of Cyberspace]]
      • [[#1.1 Definition#Examples of Cyberspace in Action|Examples of Cyberspace in Action]]
    • [[#1. Cyberspace#1.2 Architecture of Cyberspace|1.2 Architecture of Cyberspace]]
      • [[#1.2 Architecture of Cyberspace#1. Physical Layer (Infrastructure & Hardware Layer)|1. Physical Layer (Infrastructure & Hardware Layer)]]
        • [[#1. Physical Layer (Infrastructure & Hardware Layer)#Function:|Function:]]
        • [[#1. Physical Layer (Infrastructure & Hardware Layer)#Examples of Technologies & Systems:|Examples of Technologies & Systems:]]
      • [[#1.2 Architecture of Cyberspace#2. Network Layer (Communication & Protocol Layer)|2. Network Layer (Communication & Protocol Layer)]]
        • [[#2. Network Layer (Communication & Protocol Layer)#Function:|Function:]]
        • [[#2. Network Layer (Communication & Protocol Layer)#Examples of Technologies & Systems:|Examples of Technologies & Systems:]]
      • [[#1.2 Architecture of Cyberspace#3. Application Layer (User Interaction & Services Layer)|3. Application Layer (User Interaction & Services Layer)]]
        • [[#3. Application Layer (User Interaction & Services Layer)#Function:|Function:]]
        • [[#3. Application Layer (User Interaction & Services Layer)#Examples of Technologies & Systems:|Examples of Technologies & Systems:]]
      • [[#1.2 Architecture of Cyberspace#How These Layers Work Together|How These Layers Work Together]]
      • [[#1.2 Architecture of Cyberspace#Example: Accessing a Website|Example: Accessing a Website]]
    • [[#1. Cyberspace#1.3 Regulation of Cyberspace|1.3 Regulation of Cyberspace]]
  • 2. Overview of Computer and Web Technology
    • [[#2. Overview of Computer and Web Technology#2.1 Communication and Web Technology|2.1 Communication and Web Technology]]
  • 3. Internet
    • [[#3. Internet#3.1 Internet, World Wide Web, Advent of Internet|3.1 Internet, World Wide Web, Advent of Internet]]
    • [[#3. Internet#3.2 Internet Infrastructure for Data Transfer and Governance|3.2 Internet Infrastructure for Data Transfer and Governance]]
      • [[#3.2 Internet Infrastructure for Data Transfer and Governance#Infrastructure:|Infrastructure:]]
      • [[#3.2 Internet Infrastructure for Data Transfer and Governance#Data Transfer:|Data Transfer:]]
      • [[#3.2 Internet Infrastructure for Data Transfer and Governance#Governance:|Governance:]]
    • [[#3. Internet#3.3 Internet Society|3.3 Internet Society]]
      • [[#3.3 Internet Society#Goals:|Goals:]]
  • 4. Concept of Cyber Security
    • [[#4. Concept of Cyber Security#4.1 Issues and Challenges of Cyber Security|4.1 Issues and Challenges of Cyber Security]]
      • [[#4.1 Issues and Challenges of Cyber Security#Common Threats:|Common Threats:]]
      • [[#4.1 Issues and Challenges of Cyber Security#Challenges:|Challenges:]]
      • [[#4.1 Issues and Challenges of Cyber Security#Solutions:|Solutions:]]

1. Cyberspace

1.1 Definition

Cyberspace is a virtual environment composed of interconnected digital technologies that enable communication, data exchange, and interaction between users, systems, and devices over computer networks—most notably, the Internet.

Key Characteristics of Cyberspace

  1. Non-Physical: Unlike the physical world, cyberspace exists in digital form—made up of data, code, and signals.
  2. Global Connectivity: It transcends geographic and political boundaries, allowing instant communication worldwide.
  3. Human-Machine Interaction: Users access cyberspace through devices (computers, smartphones), and interact via applications, websites, and platforms.
  4. Data-Driven: Information (text, media, software) is at the core of cyberspace activity

Components of Cyberspace

  • Devices and Hardware: Computers, smartphones, servers, routers.
  • Networks: Internet, intranets, and wireless networks.
  • Software: Operating systems, browsers, web apps, APIs.
  • Users: Individuals, organizations, governments.
  • Digital Content: Emails, websites, documents, social media content.

Examples of Cyberspace in Action

  • Sending a message on WhatsApp.
  • Uploading a file to Google Drive.
  • Participating in an online multiplayer game.
  • Attending a Zoom meeting.
  • Browsing websites on Chrome or Firefox.

1.2 Architecture of Cyberspace

Cyberspace has a layered architecture, with each layer handling specific functions related to data transmission, processing, and user interaction. The primary layers include:

  1. Physical Layer
  2. Network Layer
  3. Application Layer

The layered architecture of cyberspace enables a structured and secure digital environment. Each layer has a distinct role, ensuring efficient communication, accessibility, and protection of data.


1. Physical Layer (Infrastructure & Hardware Layer)

Function:
  • This is the foundation of cyberspace, consisting of physical devices and infrastructure that enable data transmission.
  • It includes hardware components that facilitate communication and data exchange.
Examples of Technologies & Systems:
  • Communication Infrastructure – Fiber optic cables, cellular towers, satellites.
  • Network Devices – Routers, switches, modems.
  • Servers & Data Centers – Store and process digital information.
  • Personal Computing Devices – Laptops, smartphones, IoT devices.

2. Network Layer (Communication & Protocol Layer)

Function:
  • Handles data transmission between devices and systems through network protocols.
  • Ensures secure and efficient data exchange across networks.
Examples of Technologies & Systems:
  • Internet Protocols (IP, TCP, UDP) – Governs how data is transmitted between devices.
  • DNS (Domain Name System) – Converts domain names into IP addresses.
  • VPN (Virtual Private Network) – Secures internet connections.
  • Firewalls & Intrusion Detection Systems (IDS) – Protects against cyber threats.
  • Wireless & Mobile Networks (Wi-Fi, 4G, 5G) – Enables internet access.

3. Application Layer (User Interaction & Services Layer)

Function:
  • Provides services and interfaces that users interact with.
  • Enables online applications, cloud computing, and web services.
Examples of Technologies & Systems:
  • Web Applications & Browsers – Chrome, Firefox, Safari.
  • Cloud Computing Platforms – AWS, Google Cloud, Microsoft Azure.
  • E-Commerce & Social Media – Amazon, Facebook, LinkedIn.
  • Cybersecurity Tools – Encryption, digital signatures, authentication systems.
  • Messaging & Email Services – WhatsApp, Gmail, Outlook.

How These Layers Work Together

  1. Physical Layer provides the infrastructure for internet access.
  2. Network Layer ensures secure data transmission between systems.
  3. Application Layer delivers services and user-friendly applications over the network.

Example: Accessing a Website

  1. Physical Layer: The request is sent via a router and fiber-optic cables.
  2. Network Layer: The DNS converts the domain to an IP, and TCP/IP delivers the request.
  3. Application Layer: The web server processes the request and displays the website.

1.3 Regulation of Cyberspace

  • Challenges: Lack of borders, anonymity, jurisdiction issues.

  • Regulators:

  • National: Cyber laws, data protection laws (e.g., India’s IT Act, 2000).

  • International: ICANN (controls domain names), ITU (communication standards), W3C (web standards).

  • Legal Tools:

  • GDPR (General Data Protection Regulation - EU)

  • Budapest Convention on Cybercrime

  • Example: The ban of TikTok in India was enforced using national cyber regulations due to data security concerns.


2. Overview of Computer and Web Technology

2.1 Communication and Web Technology

  • Communication Technology: Involves transfer of data through devices like phones, computers, satellites.

  • Web Technology:

  • HTML/CSS/JavaScript – Building blocks of the web.

  • Web 1.0: Static content; read-only.

  • Web 2.0: User-generated content; interactive (e.g., blogs, social media).

  • Web 3.0: Decentralized web, AI integration, blockchain.

  • Protocols:

  • TCP/IP: Ensures data packets are sent reliably across networks.

  • HTTP/HTTPS: Protocols for web communication; HTTPS is secure.

  • Example: When you search something on Google, your browser uses HTTPS to securely send your query to Google’s servers.


3. Internet

3.1 Internet, World Wide Web, Advent of Internet

  • Internet: A global network of interconnected computers.

  • World Wide Web (WWW): A collection of information accessed via the internet using browsers.

  • Advent of Internet:

    1. Originated from ARPANET (1969, USA).
    2. Became public in 1990s with the invention of the World Wide Web by Tim Berners-Lee.
    • Example: Email uses the internet, but not necessarily the web; web pages are accessed through browsers via the WWW.

3.2 Internet Infrastructure for Data Transfer and Governance

Infrastructure:

  1. Routers, Switches, ISPs
  2. Fiber-optic cables under oceans for global connectivity
  3. CDNs (Content Delivery Networks) to deliver content faster.

Data Transfer:

  1. Uses packet switching.
  2. IP addresses and DNS system allow unique identification.

Governance:

  • ISOC (Internet Society)
  • ICANN (domain management)
  • IETF (protocol development)
  • Example: Visiting www.example.com involves DNS translating the domain to an IP address, routing your request through ISPs and backbone providers.

3.3 Internet Society

  • ISOC: Established in 1992 to promote open development, evolution, and use of the internet.

Goals:

  • Support internet infrastructure.
  • Advocate for digital inclusion.
  • Establish best practices.
  • Digital Divide: Gap between those who have access to modern information technology and those who don’t.
  • Example: ISOC supports community networks in rural Africa to improve internet access.

4. Concept of Cyber Security

4.1 Issues and Challenges of Cyber Security

  • Cyber Security: Practice of protecting systems, networks, and programs from digital attacks.

Common Threats:

  • Malware: Viruses, Trojans, ransomware.
  • Phishing: Fraudulent emails or sites to steal personal data.
  • DDoS attacks: Overwhelming a system with traffic.
  • Zero-day Exploits: Attacks before a software vulnerability is patched.

Challenges:

  • Increasing complexity of attacks (e.g., AI-powered malware).
  • Lack of awareness and training.
  • Insufficient legal frameworks in some countries.

Solutions:

  • Firewalls, antivirus software, encryption.
  • Cyber hygiene education.
  • Regular updates and patches.
  • Example: The WannaCry ransomware attack in 2017 affected over 200,000 computers globally due to a Microsoft Windows vulnerability.