Cyber Security Tutorial

Cyber Security Overview Cyber Security Introduction Cyber Crime Cyber Space Cyber Criminals Cyber Law Cyber Attackers Types of Hackers Functions of Cyber Security Method to Improve Data Security Cyber security frameworks Importance of Cyber Security Types of Cyber Security Cyber Security Fundamentals Applications of cyber security Cyber security in education sector Cyber security in health care industry Cyber security tools Cyber security policies Types of security policies Characteristics of cyber security policies Digital signature Cyber Security Standards NIST- National Institute of Standard and technology Information Technology Act ISO - International Standard for Organization ISO certification PCI DSS Standard FINRA Difference between Information Security and Cyber Security Cyber Security Vulnerability Elements of vulnerability management Social Engineering Vulnerability Assessment Vulnerability management Types of cyber security vulnerabilities Identification of security vulnerability Types of social engineering attacks Penetration Testing Penetration Testing Tools Types of penetration testing Process of Penetration Testing What is Phishing Elements of cyber security Difference between Spoofing and Phishing Difference between Network Security and Cyber Security Difference between Ethical Hacking & Cyber Security Role of artificial engineering in cyber security Cyber Forensics Definition Cyber Security job qualifications Cyber Security Prerequisites Cyber Security Identity and Access Management What is Cyber Forensics Different Types of Cybercrime Different types of cybercrime Tunneling Techniques in Cyber Security

Cyberspace

Introduction

Cyberspace combines two words, Cyber + Space having a different meaning.

Cyber is used as a synonym of the internet related to the computer, computer network, or virtual reality.

Space- Rather, the word space has different meanings according to the context. Here it means unoccupied, free and available Space in the physical or virtual world.

Definition:-

“Cyberspace is the space where interconnected computer systems exist.”

"Cyberspace is the space provided for the interaction of computers and also known as the world of computers created by machine clones."

“Cyber space is the web of the computer where customer/ user connect with each other over a network for completion of a task.”

Human exists in the universe (Space), known as the physical world. The same as the working of computers exist in the cyber world (shared information, interaction with each other, or social media platforms).

Cyberspace is different from the physical world

Cyberspace

  • It is dynamic
  • Cyberspace is exponential and undefined
  • Beyond human imagination
  • It does not have a fixed shape

Physical- world

  • This world is static and well defined
  • Having fixed counters (increment and decrement in a fixed defined area)
  • It has a definite form and reaches (definite shape and behavior)

The Cyberspace world is similar to the human brain as in human brain interaction takes place by innumerable neurons result in the working of the human body system, and cyberspace is considered a link between the infinite world and the physical world. 

Cyberspace is part of information technology infrastructure that consists of computer systems, the internet, embedded processors, telecommunication networks, and controllers in critical industries.

Cyberspace is the network environment where communication occurs via software, devices, and network connected to it but not present in physical form. It is electronic Space unbounded by distance and other physical limitations (thousands of connected computers, routers, switches, servers, and fiber optic cables).

An example of cyberspace is the home of Facebook, Yahoo, and Google where everything works in a virtual environment.       

The history of cyberspace

The word cyberspace came into existence in 1982 in the book named Necromancer written by American- Canadian author William Gibson. Firstly he published this word in a story published in Omni magazine and further in his science fiction novel. William's imagination has become today's reality where the online world is filled with computers associated with societal elements.

In his book, cyberspace was a 3D virtual space created by a network of computers representing abstract data. After book publication, cyberspace was included in the New Oxford Dictionary of English with a definition (national environment of computer network where people can communicate over the networks).

In the 1990s, cyberspace describes the "location” of the user where they are interacting via the internet. Cyberspace has no gravity, mass, or boundaries. It is the environment of bits, bytes, digital zero's, and one's where data transfers and communication occurs in this format.

Use of cyberspace

We all live in the internet era where official and unofficial working takes place with the internet. Cyberspace is the virtual environment where the internet, computer networks, and technologies resist (user can do every work-related communication). Everything around us, like education, finance, military, social media, organizations or companies, etc., is connected to cyberspace as their data is handled and stored online systematically over cyberspace virtually. Cyberspace also includes the working of e-banking and online ticket booking service.  

Working of cyberspace

Cyberspace is a huge working network of interconnected thousands of computers where communication occurs, but every human is unaware of how data transfer and communication occurs. It follows TCP/IP model for communication. The full form of TCP is a Transmission control protocol that allows the application program and another computing device to transfer data and messages over a cyber network. This TCP model has seven layers that ensure the end-to-end delivery of data. Internet Engineering Task Force (IETF) has set some standards and rules for the internet.

Internet Protocol (IP) defines and ensures how data packages from devices and their applications are exchanged with each other and connected networks. It is transferred through the Internet Protocol suite of protocols (TCP/IP).

Need of cyber security for cyberspace

Cyberspace is the virtual working world of computers where physical world laws are not applicable. For cyberspace, separate laws are formulated to prevent any illegal and antisocial activity in cyberspace, and these laws are called cyber laws. Cyber laws prevent the violation of the internet rights of any individual. These laws prevent hacking, theft, sabotaging, money laundering, cyber terrorism, online privacy breach, etc. The Indian government has made several cyber laws under penal code 1860 and ICT (Information Communication Technology) Act, 2000.

Cyber laws are related to computers and the internet to prevent cybercrimes and cyber-attacks. Cyber laws consist of illegal issues related to distributive, communicative, and transactional aspects of intercommunication devices and technologies. These laws encapsulated with legal, statutory and constitutional provisions related to computer networks and the internet.