Module 1 Introduction To Cyber Space
Module 1 Introduction To Cyber Space
1
Objectives
2
Learning Outcomes
Define and Explain the concepts
of Cyberspace
Delineate the components of Cyberspace
Compare Cyberspace with Internet
Appreciate the need for Cyber Security
and Define Cyber Security
3
Outline
6
Cybernauts
7
Levels of Cyberspace
Core Cyberspace
Extended Cyberspace
8
Core Cyberspace and Extended
Cyberspace
• Core cyberspace covers all electronic
devices, transmission medium or
connecting medium
• Extended Cyberspacecovers everything
that surrounds the core
• Anybody can access the core through
this extended space
9
Components of Cyberspace
Networks
Intermediaries
Network of
10
Networks
Layers of Cyberspace
Logical Layer
Physical Layer
11
Layers of Cyberspace
12
Cyber Domain Characteristics
13
Driving forces of Cyberspace
Efficiency
Time Space
The key
Vital and Interlinked efficiency
irreplaceab with time element in
le into a cyberspace is
Action, complex that
tapestry simultaneous
preparatio
n, The Initiation actions in
realization of Cyber- different
takes time attack is dimensionalities
from digital are performed
In cyberspace, battle space by the operators
actions occur in
the blink of anAsymmetry Anonymity
eye Opponent's weak
Cyberspace and
point exploitation its operations
by claiming are to be
competitive identified
advantage in the
most optimal way Difficulty to
detonate the
Asymmetrical location of the
warfare operator with
opportunities are their identity
the sources found in
created by cyberspace
cyberspace
14
What is Internet?
• Internet is a network of networks
• The Internet is the global system of
interconnected computer networks that
use the Internet protocol suite (TCP/IP) to
link devices worldwide
15
Contrasting Internet & Cyberspace
Cyberspace Internet
• It is a symbolic and • The design of
figurative space Internet results in a
that exists within cyberspace built out
Internet of components
• It supports • It provides services
multitude of designed to form
business, more complex
government and services
social interactions
through information
exchange
16
Introduction to Cyber Security
17
Importance of Cyber Security
18
Tools used for Cyber Security
Passwords
Anti-Virus/ Anti-Malware
Software
Software Patches
Common
tools used to
Firewalls
prevent Data
Leakage
Authentication
Encryption
19
Key elements of Cyber Security
Applicatio
n
Security
End- Informati
user on
Educatio Security
n
Key
Elements
of Cyber
Security
Operation Networ
al k
Security Securit
y
Disaste
r
Recover
y
20
Application Security
21
Information Security
• It protects information from unauthorized
access
• Helps to avoid identity theft
• Promotes Information privacy
• Major techniques used are
• Identification, Authentication and
authorization of users
• Cryptographic techniques
22
Network Security
23
Network Security
24
Disaster Recovery
25
Operational Security and End-user
Education
26
Cyber Security Questions
27
Conclusion
28
Thank you
29