0% found this document useful (0 votes)
12 views

cyber security unit-1

The document provides an overview of cyber security, defining cyberspace and its architecture, as well as the importance of computer and web technology. It emphasizes the need for cyber security measures to protect against digital threats and discusses various components of computer and web technology, including hardware, software, and networking. Additionally, it highlights the significance of web technology in communication, e-commerce, education, and government services.

Uploaded by

bindufamily123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

cyber security unit-1

The document provides an overview of cyber security, defining cyberspace and its architecture, as well as the importance of computer and web technology. It emphasizes the need for cyber security measures to protect against digital threats and discusses various components of computer and web technology, including hardware, software, and networking. Additionally, it highlights the significance of web technology in communication, e-commerce, education, and government services.

Uploaded by

bindufamily123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Unit-1

Introduction to cyber security


Defining cyber space and overview of computer and web technology, Architecture of cyber
space communication and web technology, Internet, World wide web, Advent of internet,
internet infrastructure for data transfer, and governance, Internet society, Regulation of cyber
space, concept of cyber security, Issues and challenges of cyber security.

Introduction to cyber security

Cyber security, short for "cyber security," is a field dedicated to protecting computer systems,
networks, and data from unauthorized access, attacks, damage, or theft. As our world
becomes increasingly digital, the importance of cyber security has grown exponentially.
Cyber security measures are essential for ensuring the confidentiality, integrity, and
availability of information in the face of a wide range of cyber threats.

Cyber security is a field dedicated to protecting computer systems, networks, programs, and
data from digital attacks, damage, theft, and unauthorized access. As our world becomes
increasingly digitized, the importance of cyber security has grown exponentially. The
interconnected nature of modern technology exposes individuals, organizations, and
governments to various cyber threats, making robust cyber security measures crucial for
safeguarding sensitive information and maintaining the integrity of digital systems.

The term “cyber space” was coined by science fiction author William Gibson in his 1984
novel “Neuromancer” and has since become widely used term to describe the interconnected
digital realm.

Defining Cyber Space

Cyberspace refers to the virtual computer world, and more specifically, an electronic medium
that is used to facilitate online communication. Cyberspace typically involves a large
computer network made up of many worldwide computer sub networks that employ TCP
(Transmission Control Protocol)/IP protocol to aid in communication and data exchange
activities.

OR

Cyberspace refers to the virtual environment in which communication, transactions, and


interactions take place over computer networks, particularly the Internet. It is a conceptual
domain where digital information is stored, transmitted, and processed. In essence,
cyberspace is the interconnected world of computer systems and digital networks, forming a
complex and dynamic environment.

Meaning of cyber security:

Cyber security, often spelled as "cyber security," is the practice of protecting computer
systems, networks, programs, and data from digital attacks, unauthorized access, and damage.
The primary goal of cyber security is to ensure the confidentiality, integrity, and availability
of information in the digital realm. It involves implementing a set of measures, technologies,
and best practices to safeguard computer systems and data from a wide range of cyber threats.

Over view of computer and Web technology

Computer and web technology are integral components of the digital age, shaping the way we
communicate, work, access information, and conduct various activities. Here's an overview
of computer and web technology:

Computer Technology:

1. Hardware:
o Central Processing Unit (CPU): The brain of the computer that executes
instructions.
o Memory (RAM): Temporary storage for data and program instructions.
o Storage Devices: Hard drives, SSDs, and other devices for long-term data
storage.
2. Software:
o Operating Systems: Software that manages computer hardware and provides
common services.
o Applications: Programs designed for specific tasks, such as word processors,
web browsers, and design tools.
3. Networking:
o Local Area Networks (LANs) and Wide Area Networks (WANs):
Connectivity solutions for linking computers and devices.
o Internet: A global network connecting millions of computers worldwide.
4. Security:
o Antivirus Software: Protects against malware and viruses.
o Firewalls: Control incoming and outgoing network traffic for security.
5. Emerging Technologies:
o Artificial Intelligence (AI) and Machine Learning (ML): Computers
mimicking human intelligence for tasks like image recognition and language
processing.
o Quantum Computing: Leveraging quantum bits (quits) for advanced
computational capabilities.

Web Technology:

Meaning of web technology:

Web technology refers to the set of tools, languages, protocols, and software solutions used to
create, manage, and deliver content on the World Wide Web. It encompasses the entire
process of building and maintaining websites, web applications, and online services. Web
technology plays a critical role in enabling the functionality and interactivity of the internet,
providing the infrastructure for communication, information dissemination, and collaboration
on a global scale.
Web technology encompasses a broad range of tools, languages, protocols, and frameworks
that facilitate the development, design, and functionality of websites and web applications.
Here are key components of web technology:

1. HTML (Hypertext Markup Language):


o Purpose: Defines the structure and content of web pages.
o Role: Utilized to create headings, paragraphs, lists, links, images, forms, and
other elements on a webpage.
2. CSS (Cascading Style Sheets):
o Purpose: Controls the presentation and layout of web pages.
o Role: Enables the styling of HTML elements, specifying aspects like color,
font, spacing, and responsiveness.
3. JavaScript:
o Purpose: Adds interactivity and dynamic behavior to web pages.
o Role: Allows developers to create client-side scripts for features like form
validation, animations, and real-time updates.
4. Web Browsers:
o Examples: Chrome, Firefox, Safari, Edge.
o Purpose: Platforms for accessing and displaying web content.
o Role: Interpret HTML, CSS, and JavaScript to render web pages.
5. Web Servers:
o Examples: Apache, Nginx, Microsoft IIS.
o Purpose: Handles requests from clients and serves web pages and resources.
o Role: Manages communication between the client and the server, executing
server-side scripts if necessary.
6. Backend Development:
o Languages: PHP, Python (Django), Ruby (Ruby on Rails), Node.js
(JavaScript).
o Purpose: Executes server-side logic and manages data.
o Role: Processes requests, communicates with databases, and performs server-
side tasks.
7. Databases:
o Examples: MySQL, PostgreSQL, MongoDB.
o Purpose: Stores and manages data.
o Role: Web applications interact with databases to store, retrieve, and update
information.
8. Web Application Frameworks:
o Examples: Django, Flask (Python), Ruby on Rails (Ruby), Express (Node.js).
o Purpose: Provides a structured environment for building web applications.
o Role: Simplifies development tasks by offering pre-built components and
enforcing coding standards.
9. Frontend Frameworks:
o Examples: React, Angular, Vue.js.
o Purpose: Facilitates the development of dynamic and interactive user
interfaces.
o Role: Offers reusable components and manages the flow of data between the
user interface and the backend.
10. Web APIs (Application Programming Interfaces):
o Purpose: Enables communication and data exchange between different
software applications.
o Role: Defines protocols and tools for building software and allows integration
between web services.
11. Responsive Design:
o Techniques: Media queries, flexible grid layouts, fluid images.
o Purpose: Ensures web applications are visually appealing and functional on
various devices and screen sizes.
12. Security Protocols:
o Examples: HTTPS (SSL/TLS).
o Purpose: Ensures secure communication and data transfer over the web.
o Role: Encrypts data to protect it from interception or tampering.

These components work together to create a seamless and interactive web experience,
enabling the development of diverse and feature-rich websites and applications. Advances in
web technology continue to shape the online landscape and improve the efficiency and
functionality of digital platforms.

Importance of Web Technology:

1. Communication and information sharing: It enables instant global communication


through email, social media, and messaging apps. This ease of communication fosters
connectivity and the exchange of ideas, driving social and cultural progress.
2. E-commerce and business: E-commerce relies heavily on web technology, allowing
businesses to reach customers worldwide, operate online stores, and facilitate secure
transactions. Payment gateways, online catalogues, and customer relationship
management systems are all enabled by web technology.
3. Education and Learning: It has democratized education, making knowledge
accessible to learners of all ages and backgrounds. Online course, e-learning
platforms, and educational websites provide opportunities for remote learning and
skill development.
4. Entertainment and Media: It has transformed the entertainment industry, giving rise
to streaming services, online gaming, and digital content distribution. Websites like
you Tube, Netflix, and Spotify have revolutionised how we consume media.
5. Research and Innovation: It supports research by providing access to vast
repositories of information and research papers. Collaborative online platforms
facilitate knowledge sharing among scientists, researchers, and innovators globally.
6. Government and services: Governments use web technology to provide citizens
with access to services, information, and resources. E-government initiatives
streamline administrative processes, making it easier for citizens to interact with
government agencies, file taxes, and access public services online, reducing
bureaucracy and improving efficiency.

Types of web Technology:

The types of web technology are:

A) World Wide Web (WWW): The World Wide Web is based on several different
technologies web browsers, hypertext Markup language (HTML) and Hypertext
Transfer protocol (HTTP).
B) Web Browser: The web browser is application software to explore WWW. It
provides an interface between the server and the client and requests to the server
for web documents and services.
C) Web server: web server is a program which processes the network requests of the
users and serves them with files that create web pages. This exchange takes place
using Hypertext Transfer protocol.
D) Web Pages: A web page is a digital document that is linked to the World Wide
Web and viewable by anyone connected to the internet has a web browser.
E) Web Development: web development refers to the building, creating and
maintaining of websites. It includes aspects such as web design, web publishing,
web programming, and database management. It is the creation of an application
that works over the internet that is websites.

Overview of Computer:

➢ Definition:

"A device used for computing, specifically, an electronic machine which, by means of stored
instructions and information, performs rapid, often complex calculations or compiles,
correlates and selects data". Webster's Dictionary

Features/Characteristics of Computer:

Today the computer plays a major role in the modern society and its development. The
characteristics that make a computer possible to play such vital role are:

(i) High Speed: Since electrical pulses cause all the operations of the computer, the
computers can perform large number of operations in just one second. The processing speed
of a computer is generally measured in Nano seconds. Since the computers are electronic
device and work with the electrical pulses which travel at incredible speed and hence their
internal speed is also virtually instantaneous. The speed of the processing varies with the
computer hardware.

(ii) Accuracy: The accuracy of the computers is consistently very high. Computers do not
make mistakes. Errors causes in computing are generally due to negligence, such as
inaccurate data, improper procedures, poor designs etc.

(iii) Storage Capacity: Computers have a very large storage capacity. The computers can
store large amount of data and information, which is expressed in terms of kilobytes,
megabytes and gigabytes in memory. Moreover, the storage capacity of the computers can be
increased by using secondary storage devices such as magnetic disk. The information stored
in the secondary storage devices can be retrieved quickly with the help of main memory
(RAM).

(iv) Reliability: The computers give very accurate results with predetermined values. They
correct and modify the parameters automatically and give suitable signals. They give
formatted results with high degree of precision.
(v) Versatility: Computers are very versatile machines with manual and automatic controls.
They are capable of solving any problem and can be applied in all sorts of business and other
activities.

(vi) Automation: The special feature of computer is automation i.e. the computer executes a
program continuously without any human intervention until completion. The central
processing unit of the computer makes it processing unit of the computer makes it possible.

➢ Advantages of using Computer:

Benefits from using computers are possible because computers have the advantages of speed,
reliability, consistency, storage and communications.

1. Speed: When data, instructions, and information flow along electronic circuits in a
computer, they travel at incredibly fast speeds. Many computers process billions or trillions
of operations in a single second. Processing involves computing (e.g. adding, subtracting),
sorting (e.g., alphabetizing), organizing, displaying images, recording audio, playing music
and showing a movie or video.

2. Reliability: The electronic components in modern computers are dependable and reliable
because they rarely break or fail.

3. Consistency: Given the same input and processes, a computer will produce the same results
consistently. A computing phrase known as garbage in, garbage out-points out that the
accuracy of a computer's output depends on the accuracy of the input.

4. Storage: A computer can transfer data quickly from storage to memory, process it and then
store it again for future use. Many computers store enormous amounts of data and make this
data available for processing anytime it is needed.

5. Communications: Most computers today can communicate with other computers often
wirelessly. Computers with this capability can share any of the four information processing
cycle operations - input, process, output and storage - with another computer or a user.

Limitations of Computer:

The computer can outperform human beings in speed, memory and accuracy but still the
computer has limitations. There are following limitations of a computer.

(i) Programmed by human: Though computer is programmed to work efficiently, fast and
accurately but it is programmed by human beings to do so. Without a program, computer is
nothing. A program is a set of instructions. Computer only follows these instructions. If the
instructions are not accurate the working of computer will not accurate.

(ii) Thinking: The computer cannot think itself. The concept of artificial intelligence shows
that the computer can think. But still this concept is dependent on set of instructions provided
by the human beings.

(iii) Self Care: A Computer cannot care itself like a human. A computer is dependent still to
human beings for this purpose.
(iv) Retrieval of memory: A computer can retrieve data very fast but this technique is linear.
A human being's mind does not follow this rule. A human mind can think randomly which a
computer machine cannot.

(v) Feelings: One of the main limits in the computer is of feeling. A computer cannot feel
about some like a human. A computer cannot meet human in respect of relations. Human can
feel, think and caring but a computer machine itself cannot. A computer cannot take place of
human because computer is always dependent of human.

Architecture of cyber space

The architecture of cyberspace is a complex and interconnected system that encompasses


various layers, components, and protocols. It involves the organization and arrangement of
digital elements to facilitate communication, data exchange, and the functioning of the
internet and computer networks. Below is a high-level overview of the architecture of
cyberspace:

1. Internet infra-structure: It is a vast network of interconnected computers and


servers that span the globe. The internet’s architecture is based on the internet
protocol IP suite, which defines how data packets are routed and transmitted between
devices.
2. Web servers and clients: It store and serve web content, such as HTML files, images
and videos, to user’s web browsers (clients). The Hypertext Transfer protocol (HTTP)
governs the communication between web servers and clients, enabling the retrieval
and display of web pages.
3. Cloud computing: It involves the delivery of computing resources (example server’s
storage, databases, software) over the internet. Cloud services provide scalability,
flexibility, and accessibility, allowing businesses and individuals to store data and run
applications without the need for on-premises infra-structure.
4. Cyber security layers: It includes multiple layers of cyber security measures to
protect against threats like cyber-attacks and data breaches. These layers include
firewalls, encryption, intrusion detection systems, and authentication protocols, which
safeguard data and ensure secure online interactions.
5. Content delivery Networks (CDNs): CDNs are distributed networks of servers
strategically placed worldwide to deliver web content more efficiently. They reduce
latency by caching and serving content from servers geographically closer to the user,
improving website performance and responsiveness.
6. Virtual Environment and social Media: Within cyber space, virtual environments
and social media platforms provide spaces for users to interact collaborate and share
information. These platforms have their architectures, supporting user-generated
content, real-time communication, and social networking features.
7. Block chain Technology: Block chain is an emerging technology with a unique
architecture that underpins crypto currencies like Bit coin. It is a decentralized ledger
that records transactions across a network of computers. It ensures transparency,
security, and immutability of data, making it suitable for various applications beyond
crypto currencies.
8. IOT (Internet of Things): IOT devices, such as smart appliances, wearable, and
sensors, are integrated into cyberspace architecture. They collect and transmit data to
the Internet, enabling automation, remote monitoring, and data analysis for various
industries and applications.
Communication and web technology:

Communication and web technology are tightly intertwined, playing a crucial role in
shaping the way individuals, businesses, and organizations connect and share
information.

Communication Technologies: communication technologies facilitate the exchange of


information between individuals and entities. In the context of web communication
technologies include:

1. Enabling global connectivity: web technology forms the backbone of modern


communication, facilitating instant global connectivity. The internet, built on web
technology allows people to communication real time through emails, messaging
apps, and social media platforms.
2. Websites and online presence: websites are a fundamental part of web technology and
serve as digital platforms for communication. Individuals, businesses and institutions
use websites to convey information, provide services, and interact with their target
audience.
3. Email and messaging services: It allows for asynchronous communication through
electronic messages. Messaging services like whatsapp, Facebook, Messenger, and
slack offer real time multimedia rich communication options, fostering efficient and
interactive conversations
4. Video and voice communication: web technology powers video conferring and voice
communication applications like zoom, Skype, and Microsoft Teams. These platforms
enable face to face virtual meetings, webinars, and voice calls, facilitating both
personal and business interactions.
5. Web Accessibility: Web technology includes accessibility features that make digital
communication inclusive for people with disabilities. It involves designing websites
and applications to be usable by individuals with various impairments, ensuring
equitable access to information and services.
6. Mobile communication: Mobile web technology, through smart phones and tablets,
has revolutionized communication by allowing people to access the internet and
communicate on the go. Mobile apps and responsive web design have optimized
communication experiences on smaller screens.

Internet:

The term "Internet" refers to a global network of interconnected computers and computer
networks that communicate with each other using a standardized set of protocols. The
Internet allows the exchange of information, data, and resources on a global scale. It is a
decentralized network that connects millions of private, public, academic, business, and
government networks.

Key features and components of the Internet include:

1. Interconnected Networks: The Internet is not a single, centralized network but rather
a vast collection of interconnected networks. These networks use various
technologies, such as wired and wireless connections, to facilitate communication.
2. Protocols: The Internet relies on a set of standardized protocols, including the
Transmission Control Protocol (TCP) and the Internet Protocol (IP), commonly
referred to as TCP/IP. These protocols ensure the reliable transmission of data across
diverse networks.
3. World Wide Web (WWW): The World Wide Web is a system of interlinked
hypertext documents and multimedia content accessed through the Internet. It is a
popular service on the Internet, allowing users to navigate between web pages using
hyperlinks.
4. Web Browsers: Web browsers, such as Chrome, Firefox, Safari, and Edge, are
software applications that allow users to access and navigate the World Wide Web.
They interpret HTML, CSS, and JavaScript to display web content.
5. Email: Electronic mail (email) is a widely used communication tool on the Internet. It
allows individuals and organizations to send and receive messages, documents, and
multimedia content over the network.
6. Search Engines: Search engines, like Google, Bing, and Yahoo, enable users to
search for information on the Internet. They index web pages and provide relevant
results based on user queries.
7. Online Services: The Internet hosts a variety of online services, including social
media platforms, online shopping, streaming services, cloud computing, and more.
These services contribute to the diverse and dynamic nature of online interactions.
8. Domain Names and IP Addresses: Websites on the Internet are identified by domain
names (e.g., www.example.com) and associated IP addresses. Domain names provide
a human-readable format for accessing websites, while IP addresses are numerical
identifiers.
9. ISP (Internet Service Provider): ISPs are companies that provide individuals and
organizations with access to the Internet. They offer various types of connectivity,
including broadband, DSL, and dial-up.
10. Global Accessibility: One of the defining characteristics of the Internet is its global
reach. Users can access information and communicate with others worldwide,
transcending geographical boundaries.

The Internet has become an integral part of modern life, influencing how people
communicate, work, access information, and engage with digital content. It has played a
transformative role in shaping various aspects of society, economy, education, and culture.

Advent and uses of Internet:

Advent of Internet:

The advent of the Internet represents a transformative milestone in the history of technology
and communication. The Internet's origins can be traced back to the late 1960s, and its
development over subsequent decades has had a profound impact on various aspects of
society. Here is an overview of the advent of the Internet:

1. Origins (1960s-1970s):
o The concept of a decentralized computer network was first proposed in the
1960s. The U.S. Department of Defense's Advanced Research Projects
Agency (ARPA) developed the ARPANET, the precursor to the modern
Internet.
o ARPANET, established in 1969, aimed to create a robust and resilient
communication network that could withstand partial outages, making it a more
reliable system than traditional centralized networks.
2. Early Protocols and Standards:
o The development of key protocols laid the foundation for the Internet. The
Transmission Control Protocol (TCP) and the Internet Protocol (IP) were
introduced in the 1970s, forming the basis of the TCP/IP protocol suite.
o TCP/IP allowed for the standardization of communication between different
types of computer systems, ensuring interoperability.
3. Expansion and Commercialization (1980s):
o In the 1980s, the use of TCP/IP expanded beyond military and research
institutions to include universities and eventually commercial entities.
o The Domain Name System (DNS) was introduced to simplify the process of
assigning and remembering IP addresses, replacing the need to memorize
numerical addresses with human-readable domain names.
4. World Wide Web (1990s):
o The World Wide Web, created by Sir Tim Berners-Lee in 1989, became
publicly accessible in the early 1990s. It introduced concepts like hypertext
and provided a user-friendly interface for accessing information on the
Internet.
o The development of web browsers, such as Mosaic and Netscape, made the
World Wide Web more accessible to the general public.
5. Commercialization and Dot-Com Boom (1990s-2000s):
o The 1990s saw a surge in commercial activity on the Internet, known as the
dot-com boom. Many companies emerged, offering online services, e-
commerce, and web-based applications.
o The proliferation of broadband Internet access further fueled the growth of
online content, services, and communication.
6. Social Media and Web 2.0 (2000s-2010s):
o The 2000s witnessed the rise of social media platforms such as Facebook,
Twitter, and LinkedIn, transforming the way people connect and share
information.
o Web 2.0 emerged as a concept, emphasizing user-generated content,
collaboration, and interactive web experiences.
7. Mobile Internet and Connectivity (2010s-2020s):
o The widespread adoption of smartphones and mobile devices has brought the
Internet to a global audience, enabling access anytime, anywhere.
o The Internet of Things (IoT) has further expanded connectivity, with devices
and objects being interconnected for data exchange.
8. Emergence of New Technologies:
o Technologies like cloud computing, artificial intelligence, and blockchain
have integrated with the Internet, shaping new possibilities for storage,
computation, and decentralized applications.

The advent of the Internet has revolutionized communication, commerce, education, and
various other aspects of society, fostering connectivity and information exchange on a global
scale. It continues to evolve, presenting new opportunities and challenges in the digital age.

Uses of Internet:

The Internet has become an indispensable part of daily life, playing a crucial role in various
aspects of communication, information access, business, education, entertainment, and more.
Here are some key uses of the Internet:
1. Communication:
o Email: Electronic mail enables fast and efficient communication, allowing
individuals and organizations to send messages, documents, and multimedia
content.
o Instant Messaging: Platforms like WhatsApp, Facebook Messenger, and
Telegram facilitate real-time text, voice, and video communication.
2. Information Access:
o Web Browsing: The World Wide Web provides a vast repository of
information on virtually every topic, accessible through web browsers like
Chrome, Firefox, and Safari.
o Search Engines: Google, Bing, and other search engines help users find
specific information quickly by indexing and ranking web pages.
3. Education:
o Online Learning: Educational platforms and institutions offer online courses,
webinars, and degree programs, providing flexible learning opportunities.
o Research: Students and researchers can access academic journals, databases,
and libraries online to gather information and conduct research.
4. Business and Commerce:
o E-commerce: Online shopping platforms, such as Amazon, eBay, and
Alibaba, allow consumers to purchase goods and services from anywhere in
the world.
o Digital Marketing: Businesses use the Internet for advertising, social media
marketing, and reaching a global audience.
5. Social Networking:
o Social Media: Platforms like Facebook, Twitter, Instagram, and LinkedIn
enable users to connect, share content, and communicate with friends,
colleagues, and communities.
o Blogging and Content Creation: Individuals and businesses use platforms
like WordPress, Medium, and YouTube to create and share content.
6. Entertainment:
o Streaming Services: Platforms like Netflix, Hulu, and Spotify offer on-
demand streaming of movies, TV shows, music, and podcasts.
o Online Gaming: Multiplayer online games and gaming platforms connect
players worldwide for interactive gaming experiences.
7. Remote Work and Collaboration:
o Video Conferencing: Tools like Zoom, Microsoft Teams, and Skype facilitate
virtual meetings and collaboration among remote teams.
o Cloud Computing: Services like Google Workspace and Microsoft 365
enable collaborative document editing and storage.
8. Healthcare:
o Telemedicine: Patients can consult with healthcare professionals remotely,
accessing medical advice and services online.
o Health Information: Individuals can find information on medical conditions,
treatments, and healthy living through reputable online sources.
9. News and Information Sharing:
o Online News: News websites and portals provide up-to-date information on
global events, politics, and various topics.
o Blogs and Forums: Platforms like Reddit and Quora allow users to share
opinions, ask questions, and participate in discussions.
10. Government Services:
o Online Services: Many government services, such as tax filing, permit
applications, and voting registration, are accessible through official websites.

The uses of the Internet continue to evolve as technology advances, offering new
opportunities for communication, collaboration, and access to information across the globe.

World Wide Web:

World Wide Web (WWW) Meaning:

The World Wide Web (WWW or Web) refers to an information space where documents and
resources are identified by Uniform Resource Locators (URLs) and can be accessed via the
Internet. It is a system of interlinked hypertext documents and multimedia content that is
browsed and navigated using web browsers. The WWW is a subset of the broader Internet,
and it plays a central role in providing a user-friendly interface for accessing and sharing
information globally.

Components of World Wide Web:

The components of World Wide Web are:

1. Hypertext Transfer Protocol (HTTP)

This protocol is used to transfer hypertexts (special format of the text that can contain links
to other texts) over the internet and it is defined by the www (World Wide Web) for
information transfer. This protocol defines how the information needs to be formatted
and transmitted and the various actions the web browsers should take in response to the calls
made to access a particular web page.

Whenever a user opens their web browser, the user will indirectly use HTTP as this is the
protocol that is being used to share text, images, and other multimedia files on the World
Wide Web.

HTTP therefore enables users to access web pages by standardizing communications and data
transfer between the internet’s servers and clients.

2. Uniform Resource Locator (URL): A URL is a web address used to locate specific
resources on the internet. It consists of several parts, including the protocol (eg., http:// or “
https://”), domain name (eg., “www. Example.com”), and an optional path to a specific web
page or resource (eg., “about”.) URLs make it easy for users to access websites and web
pages by specifying their unique addresses.

3. Web pages: web pages are the fundamental building blocks of the www. These documents
contain text, images, multimedia elements, and hyperlinks that allow users to navigate to
other web pages. They are typically written in HTML (Hyper Markup Language) and are
displayed in web browsers like chrome, Firefox, or safari. Web pages can range from simple
text-based documents to complex, interactive applications.
4. Hyperlinks: Hyperlinks, often referred to as links, are connections between web pages.
They are highlighted text or elements (such as buttons or images) that, when clicked, take
users to another web page or resource. Hyperlinks enable seamless navigation within the
web, allowing users to explore related content or follow a trail of information across different
websites.

5. Web browsers: web browsers are software applications that allow users to access and
view web pages. They interpret HTML and other web technologies, rendering web content in
a readable and interactive format. Popular web browsers include Google chrome, Mozilla
Firefox, Microsoft Edge, and Apple safari. They are essential tools for navigating and
interacting with the WWW.

6. Web servers: web servers are computers or software programs that store and serve web
pages to user’s web browsers upon request. They play a central role in delivering web content
across the internet. Web servers use the Hypertext Transfer protocol to transmit data to
clients (web browsers) and are responsible for processing requests and responses.

7. Hypermedia and Multimedia: While text based content is essential the web also includes
hypermedia and multimedia elements. Hypermedia incorporates links to other web resources,
enriching the browsing experience by allowing users to access images, videos, audio files,
interactive applications, and more. These multimedia elements make web content more
engaging and informative.

Internet infra-structure for data transfer and governance


Internet Society: ISOC

The term "Internet Society" can refer to two related but distinct concepts:

1. The Internet Society (ISOC):


o Organization: The Internet Society (ISOC) is a nonprofit organization
founded in 1992 with the mission to promote the open development,
evolution, and use of the Internet for the benefit of all people globally. It
provides leadership in internet-related standards, education, and policy.
o Activities: ISOC engages in various activities, including advocating for
policies that support an open and accessible internet, promoting the
development of internet standards through the Internet Engineering Task
Force (IETF), supporting internet research and education initiatives, and
organizing events and conferences.
2. Internet Society (Societal Aspect):
o Global Network of Users: The Internet Society, in a broader societal context,
refers to the community of internet users, developers, businesses,
governments, and organizations that collectively contribute to the growth,
evolution, and use of the internet.
o Principles: This societal aspect emphasizes principles such as open access,
collaboration, innovation, and the belief in the internet as a tool for
empowerment, knowledge sharing, and positive social change.

Key Aspects of the Internet Society:

1. Openness and Accessibility:


o The Internet Society advocates for an open and accessible internet,
emphasizing principles such as net neutrality, which promotes equal access to
online content and services for all users.
2. Global Collaboration:
o The internet is a global network, and the Internet Society encourages
collaboration among individuals, organizations, and governments to address
challenges and opportunities related to the internet's development and use.
3. Technical Standards and Innovation:
o The development and adherence to technical standards, facilitated by
organizations like the Internet Engineering Task Force (IETF), ensure the
interoperability and continued innovation of the internet.
4. Internet Governance:
o ISOC and other entities work to promote multi-stakeholder models of internet
governance, involving the participation of various stakeholders, including
governments, businesses, civil society, and the technical community.
5. Education and Capacity Building:
o The Internet Society is involved in educational initiatives to enhance
understanding of internet technologies and their impact. This includes
programs to build capacity in developing regions and to address digital
literacy.
6. Advocacy for Digital Rights:
o The Internet Society advocates for the protection of digital rights, including
privacy, freedom of expression, and the right to access information.
7. Collaboration with Internet-related Organizations:
o ISOC collaborates with other internet-related organizations, such as the
Internet Corporation for Assigned Names and Numbers (ICANN) and the
World Wide Web Consortium (W3C), to address various issues related to
internet governance and development.

In summary, the Internet Society encompasses both a specific organization, the Internet
Society (ISOC), and a broader concept of a global community of individuals and entities
working collaboratively to ensure the open, accessible, and beneficial development and use of
the internet.

Societal Impact of the Internet:

The Internet has had a profound impact on society across various domains:
Benefits of Internet Society:

The benefits of Internet society are:

1. Advocacy for an open Internet: ISOC advocates for policies and practices that up
hold the principles of a free and open Internet. It promotes net neutrality, digital
rights, privacy protection, and accessibility for all, ensuring that the internet remains a
global resource that benefits everyone.
2. Global Internet standards and interoperability: ISOC actively participates in the
development and promotion of internet standards and protocols through organizations
like the Internet Engineering Task force (IETF). This ensures that the internet’s
technical foundations are robust, reliable, and interoperable, allowing seamless
communication across diverse networks and devices.
3. Capacity building and education: ISOC provides educational resources and training
programs to enhance internet knowledge and expertise. These initiatives help
individuals and communities better understand the internet’s complexities,
opportunities, and risks.
4. Research and policy Analysis: ISOC conducts research on various internet related
topics, offering valuable insights and analysis to inform policy decisions. Its research
helps policy makers and stake holders make informed choices regarding internet
governance, infrastructure development and cyber security.
5. Promotion of digital inclusion: ISOC actively works to bridge the digital divide by
promoting policies and initiatives that expands internet access to underserved and
marginalized populations. This includes efforts to connect and remote rural areas and
ensures the benefits of internet are accessible to all.
6. Global impact and influence: ISOC global reach and influence allow it to shape the
internet development and governance by participating in International Forums,
engaging with policy makers, and collaborating with other stake holders to address
emerging challenges and opportunities.

Regulation of cyber space:

Regulating cyberspace involves establishing rules, standards, and laws to govern the conduct
and interactions of individuals, organizations, and entities in the digital realm. The challenges
of regulating cyberspace include the global nature of the internet, the rapid pace of
technological advancements, and the need to balance innovation and security. Here are some
key aspects of regulations in cyberspace:

1. National and International Jurisdiction: The challenge of regulating cyberspace


lies in its global nature. The internet transcends national borders, making it essential
for regulations to consider international cooperation and coordination. While nations
have the authority to enact laws and regulations within their jurisdictions, cross-
border internet activities often require collaboration between countries and adherence
to international agreements.
2. Cyber security and data Protection: Regulations pertaining to cyber security aim to
protect critical infrastructure and data from cyber threats and attacks. Data protection
laws govern the collection, processing, and sharing of personal information online,
ensuring privacy rights are respected.
3. Intellectual property and copyright: Copyright laws applied to digital content,
including text, images, music and software to prevent unauthorised distribution and
infringement. These laws balance creator’s right with the public access to information
and cultural expression.
4. Online Commerce and consumer Protection: E-commerce regulations govern online
transactions, ensuring consumer rights, financial security and fare business practices.
These regulations include laws related to online payment processing, consumer
protection and product safety.
5. Freedom of expression and content moderation: Regulations addressing freedom of
expression seek to strike a balance between protecting free speech and combating
harmful content. Platforms may have policies and guidelines for content moderation
to maintain a safe and inclusive online environment.
6. Cybercrimes and law enforcement: Laws against cybercrime address offenses such as
hacking, identity theft, fraud, and online harassment. Law enforcement agencies
collaborate nationally and internationally to investigate and prosecute cybercrimes.
7. Internal Governance and Multistakeholders Model: Internet Governance involves
various stakeholders, including governments, the private sector, civil society, and
technical experts. Forums like the Internet Governance Forum (IGF) facilitate
discussions on internet-related policy issues and promote a multistakeholder approach
to decision making.
8. Challenges and Evolving landscape: The fast-paced and evolving nature of
technology poses challenges to regulation. New technologies like artificial
intelligence, block chain, and the Internet of Things (IOT) require adaptive and
forward thinking policies.

Concept of cyber security:

Cyber security refers to the practice of protecting computer systems, networks, programs,
and data from digital attacks, unauthorized access, damage, or theft. It involves the
implementation of measures, technologies, processes, and best practices to ensure the
confidentiality, integrity, and availability of information in the digital space. Cyber security is
crucial in safeguarding individuals, organizations, and governments from the evolving
landscape of cyber threats.

Key Concepts and Components of Cyber security:

1. Confidentiality:
o Protection of Sensitive Information: Cyber security aims to prevent
unauthorized access to sensitive data, ensuring that only authorized individuals
or systems can access and view confidential information.
2. Integrity:
o Data Integrity Assurance: Cyber security measures are implemented to
ensure that data remains accurate, unaltered, and trustworthy. This involves
protecting against unauthorized modifications or manipulations of data.
3. Availability:
o Maintaining System Uptime: Cyber security seeks to ensure the availability
of information and services, preventing disruptions caused by cyber- attacks or
technical failures.
4. Authentication:
o Verification of User Identity: Authentication mechanisms, such as
passwords, biometrics, and multi-factor authentication, are employed to verify
the identity of users and prevent unauthorized access.
5. Authorization:
o Access Control: Authorization mechanisms determine the level of access that
users, systems, or applications have to specific resources, ensuring that
individuals can only access information relevant to their roles.
6. Risk Management:
o Identification and Mitigation of Risks: Cyber security involves identifying
potential threats and vulnerabilities, assessing their impact, and implementing
measures to manage and mitigate risks effectively.
7. Encryption:
o Secure Data Transmission: Encryption is used to convert sensitive data into
a coded format, making it unreadable to unauthorized entities. It is crucial for
securing data during transmission and storage.
8. Firewalls and Intrusion Detection/Prevention Systems (IDS/IPS):
o Network Security Measures: Firewalls and IDS/IPS systems are deployed to
monitor and control network traffic, detect suspicious activities, and prevent or
mitigate potential cyber threats.
9. Security Awareness and Training:
o Human Factor: Cyber security includes educating users about security best
practices, raising awareness of potential risks, and providing training to
minimize the human factor in security vulnerabilities.
10. Incident Response and Recovery:
o Preparedness for Cyber Incidents: Organizations develop incident response
plans to efficiently detect, respond to, and recover from cyber security
incidents, minimizing the impact on operations.
11. Endpoint Security:
o Protection of End User Devices: Endpoint security involves securing
individual devices (e.g., computers, smartphones) from cyber threats through
antivirus software, anti-malware tools, and other protective measures.
12. Patch Management:
o Software and System Updates: Regularly updating software and systems
helps address vulnerabilities and ensures that security patches are applied to
protect against known threats.
13. Security Governance and Compliance:
o Regulatory Compliance: Cyber security frameworks and regulations guide
organizations in establishing governance structures, policies, and procedures
to meet compliance requirements and industry standards.
14. Cyber Threat Intelligence:
o Monitoring and Analysis of Threats: Gathering and analyzing information
about potential cyber threats, including emerging attack vectors and tactics,
helps organizations stay ahead of evolving risks.

Cyber security is an on-going process that requires a multi-layered and adaptive approach. As
technology evolves and cyber threats become more sophisticated, organizations must
continually assess and enhance their cyber security measures to effectively protect against
potential risks and vulnerabilities.

Issues and challenges of cyber security:

Cyber security faces a range of complex issues and challenges due to the dynamic nature of
the digital landscape, the increasing sophistication of cyber threats, and the widespread
reliance on technology. Here are some key issues and challenges in the field of cyber
security:

1. Sophisticated Cyber Threats:


o Advanced Persistent Threats (APTs): Nation-state actors and well-funded
cybercriminal groups conduct persistent and sophisticated attacks targeting
specific entities for espionage, data theft, or disruption.
2. Rapidly Evolving Threat Landscape:
o Emerging Threats: Cyber threats continuously evolve with the development of
new attack methods, malware, and tactics. Staying ahead of emerging threats
requires constant monitoring and adaptation.
3. Cybercrime and Financial Motivations:
o Financially Motivated Attacks: Cybercriminals often target organizations and
individuals for financial gain, leading to incidents such as ransom ware
attacks, fraud, and theft of financial information.
4. Insider Threats:
o Internal Threats: Insiders with malicious intent or unintentional actions can
pose a significant risk to cyber security. This includes employees, contractors,
or partners who may compromise security.
5. Lack of Cyber security Awareness:
o Human Factor: Inadequate awareness and training among users contribute to
vulnerabilities, as individuals may fall victim to phishing attacks, social
engineering, or inadvertently disclose sensitive information.
6. Supply Chain Vulnerabilities:
o Third-Party Risks: Organizations increasingly rely on interconnected supply
chains. Cyber attackers may exploit vulnerabilities in the supply chain to
compromise the security of products and services.
7. Internet of Things (IoT) Security:
o Proliferation of IoT Devices: The growing number of IoT devices introduces
new attack surfaces, and many IoT devices have security weaknesses, making
them susceptible to exploitation.
8. Cloud Security Concerns:
o Cloud Misconfigurations: Misconfigured cloud environments can lead to data
exposure and unauthorized access. Ensuring proper configuration and security
measures in cloud services is crucial.
9. Inadequate Cyber security Infrastructure:
o Out-dated Systems: Legacy systems and out-dated software may have
unpatched vulnerabilities, making them susceptible to exploitation. The
challenge lies in updating or replacing these systems.
10. Data Privacy Concerns:
o Privacy Regulations: Compliance with data protection and privacy regulations
(e.g., GDPR, CCPA) poses challenges, especially in handling and securing
sensitive personal information.
11. Shortage of Cyber security Skills:
o Talent Gap: There is a global shortage of skilled cyber security professionals,
making it challenging for organizations to recruit and retain qualified
individuals to manage security operations.
12. Incident Response and Recovery:
o Timely Response: Organizations face challenges in developing effective
incident response plans, including detection, containment, eradication, and
recovery, to minimize the impact of cyber incidents.
13. Global and Cross-Border Challenges:
o Jurisdictional Issues: Cyber security incidents often span multiple
jurisdictions, creating challenges for law enforcement and legal actions against
cybercriminals operating globally.
14. Regulatory Compliance:
o Complex Compliance Requirements: Organizations must navigate a complex
landscape of cyber security regulations and standards, requiring dedicated
efforts to achieve and maintain compliance.
15. Weaponization of AI and Automation:
o Automated Attacks: The use of artificial intelligence (AI) and automation by
threat actors introduces a new dimension to cyber threats, enabling more
sophisticated and efficient attacks.

Addressing these cyber security challenges requires a comprehensive and proactive approach,
involving a combination of technology, policies, education, collaboration, and on-going
adaptation to the evolving threat landscape.
Difference between Internet and WWW

You might also like