- 1. Cyberspace
- [[#1. Cyberspace#1.1 Definition|1.1 Definition]]
- [[#1.1 Definition#Key Characteristics of Cyberspace|Key Characteristics of Cyberspace]]
- [[#1.1 Definition#Components of Cyberspace|Components of Cyberspace]]
- [[#1.1 Definition#Examples of Cyberspace in Action|Examples of Cyberspace in Action]]
- [[#1. Cyberspace#1.2 Architecture of Cyberspace|1.2 Architecture of Cyberspace]]
- [[#1.2 Architecture of Cyberspace#1. Physical Layer (Infrastructure & Hardware Layer)|1. Physical Layer (Infrastructure & Hardware Layer)]]
- [[#1. Physical Layer (Infrastructure & Hardware Layer)#Function:|Function:]]
- [[#1. Physical Layer (Infrastructure & Hardware Layer)#Examples of Technologies & Systems:|Examples of Technologies & Systems:]]
- [[#1.2 Architecture of Cyberspace#2. Network Layer (Communication & Protocol Layer)|2. Network Layer (Communication & Protocol Layer)]]
- [[#2. Network Layer (Communication & Protocol Layer)#Function:|Function:]]
- [[#2. Network Layer (Communication & Protocol Layer)#Examples of Technologies & Systems:|Examples of Technologies & Systems:]]
- [[#1.2 Architecture of Cyberspace#3. Application Layer (User Interaction & Services Layer)|3. Application Layer (User Interaction & Services Layer)]]
- [[#3. Application Layer (User Interaction & Services Layer)#Function:|Function:]]
- [[#3. Application Layer (User Interaction & Services Layer)#Examples of Technologies & Systems:|Examples of Technologies & Systems:]]
- [[#1.2 Architecture of Cyberspace#How These Layers Work Together|How These Layers Work Together]]
- [[#1.2 Architecture of Cyberspace#Example: Accessing a Website|Example: Accessing a Website]]
- [[#1.2 Architecture of Cyberspace#1. Physical Layer (Infrastructure & Hardware Layer)|1. Physical Layer (Infrastructure & Hardware Layer)]]
- [[#1. Cyberspace#1.3 Regulation of Cyberspace|1.3 Regulation of Cyberspace]]
- [[#1. Cyberspace#1.1 Definition|1.1 Definition]]
- 2. Overview of Computer and Web Technology
- [[#2. Overview of Computer and Web Technology#2.1 Communication and Web Technology|2.1 Communication and Web Technology]]
- 3. Internet
- [[#3. Internet#3.1 Internet, World Wide Web, Advent of Internet|3.1 Internet, World Wide Web, Advent of Internet]]
- [[#3. Internet#3.2 Internet Infrastructure for Data Transfer and Governance|3.2 Internet Infrastructure for Data Transfer and Governance]]
- [[#3.2 Internet Infrastructure for Data Transfer and Governance#Infrastructure:|Infrastructure:]]
- [[#3.2 Internet Infrastructure for Data Transfer and Governance#Data Transfer:|Data Transfer:]]
- [[#3.2 Internet Infrastructure for Data Transfer and Governance#Governance:|Governance:]]
- [[#3. Internet#3.3 Internet Society|3.3 Internet Society]]
- [[#3.3 Internet Society#Goals:|Goals:]]
- 4. Concept of Cyber Security
- [[#4. Concept of Cyber Security#4.1 Issues and Challenges of Cyber Security|4.1 Issues and Challenges of Cyber Security]]
- [[#4.1 Issues and Challenges of Cyber Security#Common Threats:|Common Threats:]]
- [[#4.1 Issues and Challenges of Cyber Security#Challenges:|Challenges:]]
- [[#4.1 Issues and Challenges of Cyber Security#Solutions:|Solutions:]]
- [[#4. Concept of Cyber Security#4.1 Issues and Challenges of Cyber Security|4.1 Issues and Challenges of Cyber Security]]
1. Cyberspace
1.1 Definition
Cyberspace is a virtual environment composed of interconnected digital technologies that enable communication, data exchange, and interaction between users, systems, and devices over computer networks—most notably, the Internet.
Key Characteristics of Cyberspace
- Non-Physical: Unlike the physical world, cyberspace exists in digital form—made up of data, code, and signals.
- Global Connectivity: It transcends geographic and political boundaries, allowing instant communication worldwide.
- Human-Machine Interaction: Users access cyberspace through devices (computers, smartphones), and interact via applications, websites, and platforms.
- Data-Driven: Information (text, media, software) is at the core of cyberspace activity
Components of Cyberspace
- Devices and Hardware: Computers, smartphones, servers, routers.
- Networks: Internet, intranets, and wireless networks.
- Software: Operating systems, browsers, web apps, APIs.
- Users: Individuals, organizations, governments.
- Digital Content: Emails, websites, documents, social media content.
Examples of Cyberspace in Action
- Sending a message on WhatsApp.
- Uploading a file to Google Drive.
- Participating in an online multiplayer game.
- Attending a Zoom meeting.
- Browsing websites on Chrome or Firefox.
1.2 Architecture of Cyberspace
Cyberspace has a layered architecture, with each layer handling specific functions related to data transmission, processing, and user interaction. The primary layers include:
- Physical Layer
- Network Layer
- Application Layer
The layered architecture of cyberspace enables a structured and secure digital environment. Each layer has a distinct role, ensuring efficient communication, accessibility, and protection of data.
1. Physical Layer (Infrastructure & Hardware Layer)
Function:
- This is the foundation of cyberspace, consisting of physical devices and infrastructure that enable data transmission.
- It includes hardware components that facilitate communication and data exchange.
Examples of Technologies & Systems:
- Communication Infrastructure – Fiber optic cables, cellular towers, satellites.
- Network Devices – Routers, switches, modems.
- Servers & Data Centers – Store and process digital information.
- Personal Computing Devices – Laptops, smartphones, IoT devices.
2. Network Layer (Communication & Protocol Layer)
Function:
- Handles data transmission between devices and systems through network protocols.
- Ensures secure and efficient data exchange across networks.
Examples of Technologies & Systems:
- Internet Protocols (IP, TCP, UDP) – Governs how data is transmitted between devices.
- DNS (Domain Name System) – Converts domain names into IP addresses.
- VPN (Virtual Private Network) – Secures internet connections.
- Firewalls & Intrusion Detection Systems (IDS) – Protects against cyber threats.
- Wireless & Mobile Networks (Wi-Fi, 4G, 5G) – Enables internet access.
3. Application Layer (User Interaction & Services Layer)
Function:
- Provides services and interfaces that users interact with.
- Enables online applications, cloud computing, and web services.
Examples of Technologies & Systems:
- Web Applications & Browsers – Chrome, Firefox, Safari.
- Cloud Computing Platforms – AWS, Google Cloud, Microsoft Azure.
- E-Commerce & Social Media – Amazon, Facebook, LinkedIn.
- Cybersecurity Tools – Encryption, digital signatures, authentication systems.
- Messaging & Email Services – WhatsApp, Gmail, Outlook.
How These Layers Work Together
- Physical Layer provides the infrastructure for internet access.
- Network Layer ensures secure data transmission between systems.
- Application Layer delivers services and user-friendly applications over the network.
Example: Accessing a Website
- Physical Layer: The request is sent via a router and fiber-optic cables.
- Network Layer: The DNS converts the domain to an IP, and TCP/IP delivers the request.
- Application Layer: The web server processes the request and displays the website.
1.3 Regulation of Cyberspace
-
Challenges: Lack of borders, anonymity, jurisdiction issues.
-
Regulators:
-
National: Cyber laws, data protection laws (e.g., India’s IT Act, 2000).
-
International: ICANN (controls domain names), ITU (communication standards), W3C (web standards).
-
Legal Tools:
-
GDPR (General Data Protection Regulation - EU)
-
Budapest Convention on Cybercrime
-
Example: The ban of TikTok in India was enforced using national cyber regulations due to data security concerns.
2. Overview of Computer and Web Technology
2.1 Communication and Web Technology
-
Communication Technology: Involves transfer of data through devices like phones, computers, satellites.
-
Web Technology:
-
HTML/CSS/JavaScript – Building blocks of the web.
-
Web 1.0: Static content; read-only.
-
Web 2.0: User-generated content; interactive (e.g., blogs, social media).
-
Web 3.0: Decentralized web, AI integration, blockchain.
-
Protocols:
-
TCP/IP: Ensures data packets are sent reliably across networks.
-
HTTP/HTTPS: Protocols for web communication; HTTPS is secure.
-
Example: When you search something on Google, your browser uses HTTPS to securely send your query to Google’s servers.
3. Internet
3.1 Internet, World Wide Web, Advent of Internet
-
Internet: A global network of interconnected computers.
-
World Wide Web (WWW): A collection of information accessed via the internet using browsers.
-
Advent of Internet:
- Originated from ARPANET (1969, USA).
- Became public in 1990s with the invention of the World Wide Web by Tim Berners-Lee.
- Example: Email uses the internet, but not necessarily the web; web pages are accessed through browsers via the WWW.
3.2 Internet Infrastructure for Data Transfer and Governance
Infrastructure:
- Routers, Switches, ISPs
- Fiber-optic cables under oceans for global connectivity
- CDNs (Content Delivery Networks) to deliver content faster.
Data Transfer:
- Uses packet switching.
- IP addresses and DNS system allow unique identification.
Governance:
- ISOC (Internet Society)
- ICANN (domain management)
- IETF (protocol development)
- Example: Visiting
www.example.cominvolves DNS translating the domain to an IP address, routing your request through ISPs and backbone providers.
3.3 Internet Society
- ISOC: Established in 1992 to promote open development, evolution, and use of the internet.
Goals:
- Support internet infrastructure.
- Advocate for digital inclusion.
- Establish best practices.
- Digital Divide: Gap between those who have access to modern information technology and those who don’t.
- Example: ISOC supports community networks in rural Africa to improve internet access.
4. Concept of Cyber Security
4.1 Issues and Challenges of Cyber Security
- Cyber Security: Practice of protecting systems, networks, and programs from digital attacks.
Common Threats:
- Malware: Viruses, Trojans, ransomware.
- Phishing: Fraudulent emails or sites to steal personal data.
- DDoS attacks: Overwhelming a system with traffic.
- Zero-day Exploits: Attacks before a software vulnerability is patched.
Challenges:
- Increasing complexity of attacks (e.g., AI-powered malware).
- Lack of awareness and training.
- Insufficient legal frameworks in some countries.
Solutions:
- Firewalls, antivirus software, encryption.
- Cyber hygiene education.
- Regular updates and patches.
- Example: The WannaCry ransomware attack in 2017 affected over 200,000 computers globally due to a Microsoft Windows vulnerability.