0% found this document useful (0 votes)
21 views

CS 1 Part1

Uploaded by

vaishinikg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

CS 1 Part1

Uploaded by

vaishinikg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

CYBER SECURITY

(21CSO270T)
By
Dr. Sayi Soundariya S
Overview

1. Cyberspace
2. Overview of Computer and Web-Technology
3. Architecture of Cyberspace
4. Communication and Web Technology
5. Internet
6. WWW (World Wide Web)
7. Advent of Internet
8. Internet Infrastructure for Data Transfer and Governance

9. Internet Society
10. Regulation of Cyberspace
11. Issues and Challenges of Cyber Security
Cyberspace

• Cyberspace was coined by William Gibson in the year 1984.


• The primary purpose is to share and communicate across the globe.
• It is a virtual and dynamic space created by machine clones.
• Cyberspace is composed of large computer networks which have many sub
networks which follow the TCP or IP protocol.
• It includes all network-based digital exchanges, conversations, and transactions.
• People can interact, exchange information, do business over the internet without
• having to be in the same physical place.
• It is basically the space where online interactions occur and digital data is present.
Example - Facebook

• Facebook - Interact with people all around the world, connect with friends, join
groups, and share updates, images, and videos.
• Everything you do from posting status updates to commenting on photos — occurs
in cyberspace.
• Facilitated by the platform’s digital infrastructure and network connections.
• Users can engage with each other regardless of their physical location,
demonstrating the borderless nature of cyberspace.
Example - Amazon

• Amazon - You may browse through millions of products, read reviews, compare
prices, and make purchases using Amazon’s mobile app or website without ever
having to step foot in a real store.
• In this digital world, information is shared between buyers and sellers, transactions
take place online, and things are sent all over the world.
• Large-scale e-commerce is made possible by Amazon’s online presence, which links
buyers and sellers globally in a 24/7 virtual marketplace.
Overview of Computer and Web-Technology
• Hardware: Computers consist of physical components like CPU, memory (RAM),
storage devices (HDD/SSD), input/output devices (keyboard, mouse, monitor), and
more. These components work together to process and store data.
• Software: Software includes the operating system (e.g., Windows, macOS, Linux)
and (e.g., MS office, web browsers, video games) that run on a computer. OS
manage hardware resources and provide a user interface.
• Networking: Computers can connect to each other and the internet via wired (e.g.,
Ethernet) or wireless (e.g., Wi-Fi) networks. Networking enables data sharing,
communication, and remote access.
Overview of Computer and Web-Technology
• Security: Computer security is crucial to protect data and systems from threats like
viruses, malware, and hackers. Antivirus software, firewalls, and encryption are
common security measures.
Overview of Computer and Web-Technology
• Processing Power: Moore's Law predicts that the processing power of computers
doubles approximately every two years. This constant improvement drives
innovations in various fields, including artificial intelligence, scientific research, and
data analysis.
Overview of Computer and Web-Technology
• Cloud Computing: Delivery of user on-demand resources like servers, storage, and
software over the internet (pay and use a service provider). It gives the capacity to
assemble, plan, and oversee applications on the cloud stage. Example is
AWS(Amazon Web Services), Google etc. In cloud, the service provider is the
vendors who provide services to manage applications globally through the internet
Example: Microsoft Azure.
Overview of Computer and Web-Technology
• Emerging Technologies: New opportunities for computing and networking are
being created in fields like artificial intelligence (AI), machine learning, block chain,
Internet of Things (IoT), and virtual reality (VR).
Overview of Computer and Web-Technology

• World Wide Web (WWW): Global system of interconnected documents and


resources linked through hyperlinks. It is accessed via web browsers.
• Web Browsers: Web browsers like Google Chrome, Mozilla Firefox, and Microsoft
Edge allow users to access and interact with web content.
• Web Development: Web development involves creating and maintaining websites
and web applications.
• Web Servers: Web servers store and deliver web content to users' browsers upon
request. Popular web server software includes Apache, Microsoft IIS.
• Web Security: Protect data and user privacy. Measures include SSL/TLS encrytion,
secure authentication, and regular security audits.
Architecture of Cyberspace

• Network Infrastructure: Cyberspace is often referred to as the Internet. Comprises


of a vast array of interconnected physical and virtual components, including
routers, switches, data centers, and undersea cables. Internet architecture is based
on the Internet Protocol (IP), which allows data packets to be routed across the
network.
• Protocols: Various communication protocols define how data is transmitted and
received in cyberspace. The Transmission Control Protocol (TCP) and Internet
Protocol (IP) are fundamentals of the Internet. Other protocols like HTTP
(Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and FTP (File
Transfer Protocol) govern specific types of data exchange.
Architecture of Cyberspace
• Domain Name System (DNS): DNS is a crucial component of cyberspace that
translates human-readable domain names (e.g., www.example.com) into IP
addresses. This system enables users to access websites and resources by name
rather than needing to remember numeric IP addresses.
• Data Centers: Data centers house the servers and storage infrastructure that store
and deliver digital content and services. They play a pivotal role in hosting
websites, applications, and cloud services.
• Cybersecurity: The architecture of cyberspace includes various security measures
to protect data, networks, and users. Firewalls, encryption, intrusion detection
systems, and antivirus software are examples of cybersecurity components.
Architecture of Cyberspace

• Web and Application Servers: These servers host websites, web applications, and
other online services. They respond to user requests, retrieve data from databases,
and deliver content to users' devices.
• User Devices: These are the various devices through which users access
cyberspace, including computers, smartphones, tablets, and IoT devices. Each
device has its own hardware and software components that enable connectivity
and interaction with cyberspace.
• Cloud Computing: Cloud services and platforms are an integral part of cyberspace
architecture. Cloud providers offer scalable computing resources, storage, and
services, allowing organizations to leverage the cloud for various purposes.
Architecture of Cyberspace
• Social Media and Online Communities: Cyberspace also includes virtual
communities and social media platforms that enable users to connect, share
information, and collaborate online.
• Internet of Things (IoT): IoT devices are connected to cyberspace, enabling them
to collect and exchange data with other devices and systems. Creating the "smart"
aspect of cyberspace.
• Regulations and Governance: Organizations like ICANN (Internet Corporation for
Assigned Names and Numbers) oversee domain name management, while
governments have jurisdiction over data protection and cybersecurity.
Communication and Web Technology
Communication involves the transmission of data, messages, and signals between
individuals, devices, or systems. Transition from telephones and postal mail to modern
channels such as email, instant messaging, video conferencing, and social media.
• Telecommunication Infrastructure: This includes networks of cables, satellites, and
wireless connections that enable long- distance communication.
Communication and Web Technology
• Communication Devices: Devices such as telephones, smartphones, computers,
and tablets serve as endpoints for sending and receiving messages.

• Communication Protocols: Data transfer across networks is regulated by protocols


such as TCP/IP, SMTP and SIP.
Communication and Web Technology

• Communication Applications: Real-time communication using software programs


and platforms such as email clients, messaging apps like WhatsApp and video
conferencing systems like Zoom, Microsoft Teams.
Communication and Web Technology
Web technology refers to the software, protocols, and standards used to create and
interact with content on the World Wide Web. It encompasses everything from the
infrastructure that supports webpages to the programming languages and frameworks
used to build dynamic web applications.
• Web Browsers: Web browsers are programs that render webpages and interpret
web technologies including HTML, CSS, and JavaScript. Ex: Google Chrome, Mozilla
Firefox, and Safari.
• Web Servers: Servers host websites and serve content to users’ web browsers
upon request. They run web server software like Apache or Microsoft IIS.
• Markup Languages: HTML (Hypertext Markup Language) is the standard markup
language for creating webpages and structuring content, while CSS (Cascading
Style Sheets) is used for styling and layout.
Communication and Web Technology

Scripting Languages: JavaScript is a scripting language that adds interactivity and


dynamic behavior to webpages, allowing for features like form validation, animations,
and AJAX (Asynchronous JavaScript and XML) requests.

Frameworks and Libraries: Frameworks like React, Angular, as well as libraries like
jQuery and Bootstrap, provide developers with tools and pre-built components for
building responsive and feature-rich web applications.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy