🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Final-module1-ppt (1).pptx

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Transcript

Unit1: CYBER SECURITY Introduction to Cyber Security Cyberspace – Definition, characteristics, architecture, applications. Internet, Web-technologies, WWW, Internet Infrastructure. Cyber space Regulations Focus on Information Systems and their need Importance of Cyber Secu...

Unit1: CYBER SECURITY Introduction to Cyber Security Cyberspace – Definition, characteristics, architecture, applications. Internet, Web-technologies, WWW, Internet Infrastructure. Cyber space Regulations Focus on Information Systems and their need Importance of Cyber Security and challenges in Information system 1 Learning Outcomes Define and Explain the concepts of Cyberspace Delineate the components of Cyberspace Compare Internet with WWW Compare Cyberspace with Internet Appreciate Internet Infrastructure for data communication Regulations in Cyberspace Appreciate the need for Cyber Security in Information system and Define Cyber Security 2 Cyberspace- Definition “Cyberspace refers to the virtual space that provides the infrastructure, electronic medium and related elements necessary for online global communication”. https://www.youtube.com/watch?v=3Wq4S2pXD3c 3 Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication. Cyberspace typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication and data exchange activities. Cybernauts Cybernauts are the People who are actively engaged in experience in Cyberspace for all their social. https://www.youtube.com/watch?v=djU HvCyPYhY 5 What are the Rules of Cyberspace? - YouTube Importance of cyber space: Due to growth of Network Examples of CYBER SPACE: 1. A student taking up an online class is connected in a cyber space. 2. A business man needs a cyber space to evolve his business. All his transactions takes place through cyber space, when he connects his account to a network for online payment. 3. A house wife purchasing online items is also in cyber space. Animated videos on Cyber space infrastructure - Google Search Levels of Cyberspace CORE CYBER SPACE EXTENDED CYBER SPACE https://www.youtube.com/watch?v=Do Wh7dF2_zE 9 Core Cyberspace and Extended Cyberspace Core cyberspace covers all electronic devices, transmission medium or connecting medium. Extended Cyberspace covers everything that surrounds the core Anybody can access the core through this extended space 10 Components of Cyberspace Physical Devices Computer and Software Data Networks Intermediaries Network of Networks 11 Cyber Domain Characteristics Major Characteristics of Cyber Domain Virtuality Expansion Ambiguity Interactivity Connectivity 12 Communication and Web technologies Exchange of information through speech, signs, symbols or text is called Communication. Web Technology refers to the various tools and techniques that are utilized in the communication between different types of devices over the internet. A basic example of a Web technology is client–Server technology. Overview of Web technologies What is Internet? Internet is a network of networks. The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection. 18 WWW (World wide web) The World Wide Web (WWW ) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet. English scientist Tim Berners- Lee invented the World Wide Web in 1989. Difference between Internet & WWW Sl. Internet WWW No 1. Internet is a global network of WWW stands for World wide Web. networks. 2. Internet is a means of World Wide Web which is a connecting a computer to collection of information which is any other computer accessed via the Internet. anywhere in the world. 3. WWW is service on top of that Internet is infrastructure. infrastructure. 4. Internet can be viewed as a Web can be viewed as collection of big book-store. books on that store. 5. Internet is primarily WWW is more software-oriented as hardware-based. compared to the Internet. 6. English scientist Tim Berners-Lee It is originated sometimes in invented the World Wide Web in late 1960s. 1989. Contrasting Internet & Cyberspace Cyberspace Internet It is a symbolic and The design of Internet figurative space that results in a cyberspace exists within Internet built out of components It supports multitude of It provides services business, government designed to form more and social interactions complex services through information exchange. 21 Internet Infrastructure Internet Infrastructure||Meaning||Components||Require ment||Network Infrastructure||E-commerce|| - YouTube Internet Infrastructure for data communication Router: The router acts as a barrier between the Internet and devices on your home network. Fire wall: A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. A firewall is essentially the barrier that sits between a private internal network and the public Internet. Gateway: Gateway transfer data among various networks. It is a node in a network that serve as an entrance to another network. The gate way is the ISP that connect the user and firewalls. Internet Governance Internet Governance, broadly defined, as the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet. It covers activities such as development and coordination of technical standards, operation of critical infrastructure and public policy issues. CYBERSPACE REGULATION Cyberspace is regulated by four sorts of constraint i.e., law, social norms, market and codes (also called architecture). Cyber space regulations are set of rules implemented or codified in the software by the code writers, requiring the constant certification of identity. (i) Privatization: The state can use a private body to achieve those goals which it could not get directly and then implement that body’s decision through mandatory technological arrangements. For e.g. for Copyright enforcement in Cyberspace. Plan was to make Internet Service Providers (ISPs) strictly liable for copyright violations by their subscribers – thus creating a private police force, largely free of statutory and constitutional privacy constraints with strong incentives to come up with innovative surveillance and technical enforcement measures. ii) Propertization: It refers to an attempt to be made to extend and protect intellectual property rights online. This will produce many technical methods of enforcement. iii) Technological Controls the system to be designed so as to hardware in desired regulatory features. For e.g. Digital texts and music could be encoded to a particular person. e.g. watermarking. Detection devices could be built in to players, so that others cannot play one’s music. Unique identifiers could be built into computer chips, so that a person’s computer would broadcast a universal ID with an associated set of legal characteristics as roamed in the net. Introduction to Cyber Security Cyber Security is protection against the criminal or unauthorized use of electronic data Preventative methods used to protect information from being attacked 29 Advantages of Cyber Security Cyber Security protects us from critical attacks. Helps in browsing the safe websites. Provides security of data in the cyber space. 30 Cyber Security Issues and Challenges in Information Systems Issues Challenges Data Confidentiality Authentication Authorization Data Integrity Auditing Data Availability Non-repudiation System Configuration 31 Cyber Security Issues and Challenges in Information Systems Issues Challenges Solutions Data Confidentiality Authentication Encryption Data Integrity Authorization Modification Data Availability Time availability of Auditing server System Validation Configuration Non-repudiation CIA Triad - YouTube 32 Conclusion We are living in digital era and digital technology has transformed our lives promoting the need for Cyber Security. This unit has discussed about the introduction to Cyber Security, fundamentals of cyberspace, importance of cyberspace and Internet etc. Importance of Infrastructure of Internet and web- technologies. Issues and challenges in Cyber security. Thank you 33

Tags

cyber security networks internet information systems
Use Quizgecko on...
Browser
Browser