Sie sind auf Seite 1von 21

Guided by

MS M.Aarthi
submitted by
S.Sarmila
M.Sarveshwari
P.Shalini
R.Shobhana
S.Sri Maha Subiksha

DEPARTMENT OF COMPUTER SCIENCE


ENGINEERING

Department of CSE
Department of CSE
 It was first coined by William Gibson in 1982.
 The reason why the term “cyberspace” is chosen is that all other terms (e.g.,
cyber security, cybercrime, cyberwar, cyberterrorism, etc.) are based on, or derived
from, cyberspace itself.
 Therefore, cyber security is security of cyberspace.
Cybercrime is crime committed within cyberspace or where elements from/of
cyberspace are used as a vehicle to commit a crime, and so on for other derived
terms.
 The parent term of cyberspace is "cybernetic", derived from the Ancient
Greek word introduced by Norbert Wiener for his pioneering work in electronic
communication and control science.
 This word cyberspace first appeared in the art installation of the same name by
danish artist Susanne Ussing, 1968).
The word became popular in 1990’s when the use of internet is increased.

.
Department of CSE
1.Secure Passwords
2.Malware
3.Privacy
4.Data Breaches
5.Safe Computing
6.Online Scams

Department of CSE
Secure Passwords: The keys to our digital kingdom,
passwords should be closely protected.
Malware:This is software that is specifically designed to
gain access to or damage a computer, usually without the
knowledge of the owner.
Privacy:It can be understood as a right of an individual to
decide who can access the information, when they can
access the information, what information they can access.
Data Breaches:It occurs when a cybercriminal successfully
infiltrates a data source and extracts sensitive information.
Safe Computing:protection of computer systems from the
theft of or damage to their hardware and software.
Online Scams:It is also called as Internet Fraud.It could
involve hiding of information or providing incorrect
information for the purpose of tricking victims out of
money, property, and inheritance.
Department of CSE
CYBERSPACE

node

service service

Department of CSE
Department of CSE
Electronic computing and communication pose some of
the most complex challenges engineering has ever faced.
 They range from protecting the confidentiality and
integrity of transmitted information and deterring identity
theft to preventing the scenario recently dramatized in the
Bruce Willis movie "Live Free or Die Hard," in which
hackers take down the transportation system, then
communications, and finally the power grid.
As that movie depicted, networks of electronic
information flow are now embedded in nearly every aspect
of modern life. From controlling traffic lights to routing
airplanes, computer systems govern virtually every form of
transportation.
Department of CSE
 Radio and TV signals, cell phones, and (obviously) e-mail all
provide vivid examples of how communication depends on
computers — not only in daily life, but also for military,
financial, and emergency services.
 Utility systems providing electricity, gas, and water can be
crippled by cyberspace disruptions.
 Attacks on any of these networks would potentially have
disastrous consequences for individuals and for society.
 In fact, serious breaches of cybersecurity in financial and
military computer systems have already occurred.
 Identity theft is a burgeoning problem. Viruses and other
cyber-attacks plague computers small and large and disrupt
commerce and communication on the Internet.
Department of CSE
 Our dependency on the Internet has long since passed the
point of turning back, and I think we’ve made a mistake in that
approach.
 Fortunately, it’s extremely unlikely that the Internet will go
down entirely.
 The U.S. and most other developed countries are
thoroughly electrically and digitally dependent. Critical
infrastructures, including drinking water, sewer systems, phone
lines, banks, air traffic, and government systems, all depend on
the electric grid. After a major successful attack, we’d be back to
the dark ages in an instant.

Department of CSE
The problems are currently more obvious than the potential
solutions. It is clear that engineering needs to develop innovations for
addressing a long list Of cybersecurity priorities.

 For one, better approaches are needed to authenticate hardware,


software, and data in computer systems and to verify user identities.

Biometric technologies, such as fingerprint readers, may be one step


in that direction.
Department of CSE
 A critical challenge is engineering more secure
software.
 One way to do this may be through better
programming languages that have security protection
built into the ways programs are written.
 And technology is needed that would be able to
detect vulnerable features before software is installed,
rather then waiting for an attack after it is put into use.

Department of CSE
 Another challenge is providing better security for
data flowing over various routes on the Internet so that
the information cannot be diverted, monitored, or
altered.
 Current protocols for directing data traffic on the
Internet can be exploited to make messages appear to
come from someplace other than their true origin.

Department of CSE
Department of CSE
INFORMATIONAL RESOURCES

ENTERTAINMENT

SOCIAL NETWORKING

Department of CSE
INFORMATIONAL RESOURCES:
The internet is a virtual library of information.
We can get any kind of information on any topic that we desire,it will be
available on the internet.

ENTERTAINMENT:
It is another popular reason why many people prefer to surf the
internet.
We can download games and music instead of going out of our
comfort zone.

SOCIAL NETWORKING:
Social networking became popular amongst the youth and it replace the
physical networking.
It has evolved a great medium to connect millions of people.

Department of CSE
Department of CSE
Department of CSE
Department of CSE
Department of CSE
Department of CSE

Das könnte Ihnen auch gefallen