Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views33 pages

Cyber Security Module I

Introduction to Cyber Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views33 pages

Cyber Security Module I

Introduction to Cyber Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

What is Cyberspace?

Cyberspace is termed as a virtual and dynamic domain created by


computer clones. Cyberspace best describes the immaterial space
where interactions through digital networks, the internet, and
computer systems take place.
All digital interactions in this space, including sending emails, visiting
websites, and using social media are part of cyberspace.

A global domain within the information environment consisting of the


interdependent network of information systems infrastructures
including the Internet, telecommunications networks, computer
systems, and embedded processors and controllers.
Sources:
NIST SP 800-30 Rev. 1 under Cyberspace from CNSSI 4009
NIST SP 800-39 under Cyberspace from CNSSI 4009
The interdependent network of information technology infrastructures
that includes the Internet, telecommunications networks, computers,
information systems, industrial control systems, networks, and
embedded processors and controllers.
Sources:
CNSSI 4009-2015 from NSPD-54/HSPD-23
The interdependent network of information technology infrastructures
that includes the Internet, telecommunications networks, computer
systems, and embedded processors and controllers in critical
industries.
Sources:
NIST SP 800-160 Vol. 2 Rev. 1 from CNSSI 4009-2015, NSPD-54/HSPD-
23
NIST SP 800-53 Rev. 5 from CNSSI 4009-2015
The complex environment resulting from the interaction of people,
software and services on the Internet by means of technology devices
and networks connected to it, which does not exist in any physical
form.
Sources:
NISTIR 8074 Vol. 2 under Cyberspace
WHAT IS DIGITAL IDENTITY?
A digital identity system must serve several functions.
First: authentication-ensuring that when a message purports to be from
Alice, Alice sent it, not someone pretending to be Alice.
Second: message integrity-providing certainty that when a message
arrives from Alice, it is the same message that Alice sent, not modified
en route in any way.
Third: non-repudiation-ensuring the inability of Alice later to deny that
she sent the message, and the inability of the recipient of Alice’s
message to deny that the message was received.
Fourth: establishing a digital identity architecture may have the
beneficial side effect of facilitating confidentiality through
encryption−the knowledge that no one besides Alice can read a
message intended for her.
Before proceeding with cyber architecture, however, it is important to
examine the concept of identity itself.
Definition of Identity
Basically, the essential and unique characteristics of an entity are
what identity it.
For example, how the system will identifies this person is called Joe
Jindo where there are many Joe Jindo around the world.
These characteristics might include, among other things, the
unchanging physical traits of the person, his preferences, or other
people’s perceptions of the individual’s personality.
The skills that a person possesses can also become part of one’s
identity.
For example, a person’s identity could include the fact that he “has the
ability to drive” or that he “has brown hair”.
Some characteristics, such as height, have one correct setting.
Those traits of an individual that reflect someone else’s perceptions do
not have to have an absolute setting.
Bob may set Alice’s “is friendly” flag to true, whereas Charles may set
the same flag to false. Even if Bob and Charles agree on what should be
the flag’s setting for Alice, Alice’s own view may differ from theirs.
Thus, in practice, there is a degree of fuzziness to the definition of an
entity’s identity, and most certainly to how others perceive it.
No two identities are the same.
Each identity maps to a unique set of characteristics.
Two people may share some of the same characteristics, such as being
old enough to drive or having the same hair colour, but that does not
mean that they have the same identity.
Identity as a Commodity
In today’s economy, information on identity often is viewed as a
valuable commodity. This view of identity is worth a closer examination.
Businesses desire to advertise their products to the markets most
interested in them, and may even retool their products to be more
appealing to certain segments of a market. Knowing the preferences of
individuals allows a corporation to target perfectly their products to
those who would prefer and, thus, be most likely to purchase them.
Making a detailed survey of an individual’s preferences, though, is very
difficult, if not impossible. Often an individual cannot specify the exact
motivation for her purchase of a particular product. From the seller’s
perspective, determining which questions to ask purchasers can be a
daunting task. Further, certain questions, despite their potential
usefulness, are not likely to be answered by a purchaser. To work
around this problem, businesses use identity information as a proxy for
preferences. For example, rather than trying to discover the exact
reason why an individual purchased a Ford Mustang, a car dealer might
instead try to find out the purchaser’s profession or income level.
Suppose the car dealer discovers that a number of his customers who
have purchased Ford Mustangs are lawyers. Although the car dealer
may not understand why they purchased Ford Mustangs, he can
assume with some level of confidence that there is something about
lawyers that leads them to purchase Mustangs instead of Cougars.
VERIFYING VERSUS REVEALING AN IDENTITY
Cyberspace creates opportunities for identity theft.
One inherent property of digital media is that, it can be duplicated
perfectly and easily.
Exact copies of everything sent over a digital communications channel
can be recorded.
Consider the act of sending a signed letter to someone. In the real
space, I reveal to the recipient the exact form of my signature, but the
difficulty of mastering the art of forgery protects me from the possibility
that the recipient would begin signing letters with my signature.
However, if I send a digital letter that contains the digital representation
of my signature, the recipient could easily duplicate and use my
signature to assume my identity when signing documents. The
seriousness of this problem is highlighted when you consider that
future technologies will allow extremely important identifiers, such as
a retinal scan or a fingerprint, to be represented digitally. These
biometrics characteristics are protected in real space because they are
embedded in the physical body of the person. This is lost in
cyberspace. Thus, cyberspace needs a system that allows individuals
to verify their identities to others without revealing to them the digital
representation of their identities. A verification system would let Bob,
for example, know the identity of Alice or that she possesses a
particular trait, but would not give him the ability to impersonate Alice
or use the trait identifier as if it was his own. In our digital letter example,
Bob would be able to verify that the letter contains Alice’s signature but
would not let him sign the documents as Alice. Similarly, a verification
that someone is of the proper age to purchase alcohol would not give
the person a change to verify this identifier anything that would allow
him to represent himself as being of the proper age to purchase
alcohol. Such a system helps both the parties obtain what they want
out of exchanging identity information without the risk of identity theft.
Architecture of cyberspace
Communication and Web Technology
Communication and web technology have evolved dramatically over
the years, leading to significant changes in how we connect and share
information. Here are some major highlights:
Early Developments
• Telegraph (1837): Samuel Morse invented the telegraph, allowing
long-distance transmission of textual messages.
• Telephone (1876): Alexander Graham Bell’s invention
revolutionized real-time voice communication over distances.
• Radio (1895): Guglielmo Marconi’s development of the radio
enabled wireless communication, which became vital for mass
broadcasting.
Mid-20th Century
• Television (1927): The advent of television brought visual media
into homes, altering entertainment and information
consumption.
• Satellite Communication (1960s): Satellites began enabling
global communication, making live international broadcasts
possible.
Computer Networking
• ARPANET (1969): The precursor to the internet, ARPANET,
demonstrated packet-switching technology, connecting multiple
computers.
• Email (1971): Ray Tomlinson developed the first networked email
system, transforming professional and personal communication.
The Internet Era
• World Wide Web (1989-1991): Tim Berners-Lee invented the
web, creating a system for accessing linked documents over the
internet using HTTP, HTML, and URLs.
• Search Engines (1990s): Development of search engines like
Yahoo! and Google revolutionized information retrieval.
Mobile Communication
• Mobile Phones (1980s): The first mobile phones were
introduced, with significant improvements in portability and
functionality over the decades.
• Smartphones (2007): Apple’s iPhone combined a phone, internet
browser, and multimedia player, transforming personal
communication and computing.
Social Media and Cloud Computing
• Social Media (2000s): Platforms like Facebook, Twitter, and
Instagram redefined how people interact and share content
online.
• Cloud Computing (2000s): Services like AWS, Google Cloud, and
Microsoft Azure enabled scalable, on-demand computing
resources and data storage.
Recent Advances
• 5G Networks (2020s): The rollout of 5G technology promised
faster internet speeds and more reliable connections, supporting
the Internet of Things (IoT) and advanced applications.
• Artificial Intelligence and Machine Learning: AI-driven
communication tools, like chatbots and virtual assistants,
improved customer service and personalized user experiences.
• Blockchain: Decentralized and secure communication
applications have emerged, leveraging blockchain technology for
enhanced privacy and security.
Impactful Trends
• Remote Work and Collaboration Tools: Platforms like Zoom,
Slack, and Microsoft Teams have become essential for remote
work and collaboration.
• Streaming Services: The rise of Netflix, YouTube, and other
streaming platforms changed content consumption patterns.
• Augmented Reality (AR) and Virtual Reality (VR): These
technologies are creating new ways to experience and interact
with digital content.
These advancements have not only enhanced communication and
information sharing but also reshaped industries, economies, and
societies globally.
Internet

The Internet is a global network of interconnected computers and other


devices that communicate with each other using standardized
communication protocols. It allows for the sharing and exchange of
information, resources, and services across vast distances. Here are
some key components and features of the Internet:
Key Components
1. Infrastructure:
o Hardware: Includes routers, switches, servers, and data
centers that form the physical backbone of the Internet.
o Networks: Composed of local area networks (LANs), wide
area networks (WANs), and backbone networks that
connect different regions.
2. Protocols:
o TCP/IP (Transmission Control Protocol/Internet
Protocol): The fundamental protocol suite that governs how
data is transmitted over the Internet.
o HTTP/HTTPS (Hypertext Transfer Protocol/Secure):
Protocols used for accessing and transmitting web pages.
3. Services:
o World Wide Web: A system of interlinked hypertext
documents accessed via the Internet.
o Email: A method of exchanging digital messages.
o File Transfer Protocol (FTP): Used for transferring files
between computers.
o VoIP (Voice over Internet Protocol): Technology for making
voice calls over the Internet.
Key Features
1. Global Connectivity:
o The Internet connects millions of private, public, academic,
business, and government networks.
2. Decentralization:
o There is no single governing body; it operates on a
decentralized model with various organizations and entities
managing different aspects.
3. Scalability:
o The Internet is designed to support a vast and growing
number of users and devices.
4. Interoperability:
o Standardized protocols ensure that different devices and
networks can communicate seamlessly.
Impact
• Communication: Enables instant communication through
email, messaging apps, and social media.
• Information Access: Provides vast amounts of information
through search engines, online databases, and digital libraries.
• Commerce: Facilitates online shopping, banking, and digital
transactions.
• Entertainment: Offers streaming services, online gaming, and
digital media consumption.
• Education: Supports online learning platforms, educational
resources, and virtual classrooms.
In essence, the Internet is a vast, evolving network that has become
integral to modern life, impacting almost every aspect of society.
World wide web

The World Wide Web (WWW), commonly referred to as the web, is an


information system on the Internet that allows documents to be
connected to other documents by hypertext links, enabling users to
navigate from one document to another. Here are the key elements and
features of the World Wide Web:
Key Elements
1. Hypertext:
o Hyperlinks: Text or images that, when clicked, direct users
to another document or section within the same document.
o HTML (Hypertext Markup Language): The standard
language used to create and format web pages.
2. Web Browsers:
o Software applications, such as Google Chrome, Mozilla
Firefox, Safari, and Microsoft Edge, that enable users to
access and interact with web pages.
3. Web Servers:
o Computers that store web pages and make them available
over the Internet. They respond to requests from web
browsers using the HTTP/HTTPS protocols.
4. URLs (Uniform Resource Locators):
o Addresses used to identify and locate web pages and
resources on the web.
5. HTTP/HTTPS (Hypertext Transfer Protocol/Secure):
o Protocols used for transferring web pages over the Internet.
HTTPS includes security features for encrypted
communication.
Features and Functionality
1. Interlinking:
o Documents on the web are interlinked, allowing users to
navigate through content via hyperlinks, creating a vast and
interconnected information space.
2. Multimedia Integration:
o The web supports various types of content, including text,
images, videos, audio, and interactive elements, enhancing
the user experience.
3. Accessibility:
o The web is designed to be accessible to users around the
world, regardless of their geographic location, device, or
software.
4. Searchability:
o Search engines like Google, Bing, and Yahoo! index web
pages, making it easy for users to search for and find
specific information on the web.
Historical Context
• Invention: The World Wide Web was invented by Tim Berners-Lee
in 1989 while he was working at CERN (the European Organization
for Nuclear Research). He created the first web browser and
server, and introduced the fundamental technologies, including
HTML, HTTP, and URLs.
• Public Launch: The web became publicly accessible in 1991,
rapidly transforming how information is shared and accessed.
Impact
• Information Sharing: Revolutionized the dissemination and
accessibility of information, making vast amounts of data readily
available to anyone with internet access.
• Communication: Enabled new forms of communication, such as
blogs, social media, and online forums.
• Commerce: Gave rise to e-commerce, allowing businesses to
sell products and services online.
• Education: Facilitated online learning and access to educational
resources, democratizing education.
The World Wide Web is a critical component of the Internet, serving as
a platform for information sharing, communication, commerce, and
much more.
Advent of Internet

The advent of the Internet marks one of the most significant


technological advancements in modern history. It transformed
communication, information sharing, and numerous aspects of daily
life. Here is a detailed timeline and explanation of the key events and
developments that led to the creation of the Internet:
Early Concepts and Foundations
1. 1950s - 1960s: Early Networking Ideas
o Paul Baran and Donald Davies: Independently developed
the concept of packet switching, which became a
foundational technology for data transmission in networks.
o ARPANET: The U.S. Department of Defense's Advanced
Research Projects Agency (ARPA) funded research into a
network to connect computers at different locations,
leading to the creation of ARPANET.
Development of ARPANET
2. 1969: Birth of ARPANET
o First Connection: The first message was sent from a
computer at UCLA to a computer at the Stanford Research
Institute (SRI). The network initially connected four nodes:
UCLA, SRI, UC Santa Barbara, and the University of Utah.
o Packet Switching: ARPANET used packet switching to
transmit data efficiently, a concept still central to the
Internet.
3. 1970s: Expansion and Innovation
o Email (1971): Ray Tomlinson developed the first network
email system, allowing messages to be sent between
computers.
o TCP/IP Development (1974): Vint Cerf and Bob Kahn
proposed the Transmission Control Protocol (TCP) and
Internet Protocol (IP), which standardized data
transmission and addressed interoperability issues
between different networks.
Transition to the Internet
4. 1980s: Growth and Standardization
o TCP/IP Adoption (1983): ARPANET adopted TCP/IP as its
standard networking protocol, a crucial step in creating a
unified network of networks, now known as the Internet.
o Domain Name System (DNS) (1984): DNS was introduced
to translate human-friendly domain names into IP
addresses, simplifying navigation on the Internet.
5. Formation of the Internet
o NSFNET (1985): The National Science Foundation Network
(NSFNET) was established to connect academic and
research institutions, leading to the growth of regional and
international networks.
o Commercial Internet Service Providers (ISPs) (Late
1980s): The emergence of commercial ISPs allowed more
individuals and businesses to access the Internet.
The World Wide Web and Modern Internet
6. 1990s: World Wide Web and Popularization
o World Wide Web (1989-1991): Tim Berners-Lee at CERN
developed the World Wide Web, introducing HTML, HTTP,
and the first web browser. The web made the Internet
accessible to the general public.
o Commercialization: The Internet became increasingly
commercialized, with the rise of e-commerce, search
engines (like Yahoo! in 1994 and Google in 1998), and
widespread web hosting services.
7. 2000s - Present: Expansion and Innovation
o Broadband and Mobile Internet: High-speed broadband
connections and mobile Internet access became
widespread, drastically increasing Internet usage.
o Social Media and Cloud Computing: Platforms like
Facebook, Twitter, and services like AWS revolutionized
how people interact and businesses operate.
o IoT and 5G: The Internet of Things (IoT) and the rollout of 5G
networks further expanded the capabilities and reach of the
Internet.
Impact and Significance
• Global Connectivity: The Internet has connected people and
organizations worldwide, enabling instant communication and
information sharing.
• Economic Transformation: It has driven the digital economy, e-
commerce, online banking, and new business models.
• Social and Cultural Impact: The Internet has transformed
media, entertainment, education, and social interactions.
The advent of the Internet is a result of decades of research,
collaboration, and technological innovation, leading to a global,
interconnected network that continues to evolve and shape modern
society.
Internet Infrastructure for Data Transfer and Governance
Internet Society
The Internet Society (ISOC) is a global nonprofit organization dedicated
to ensuring the open development, evolution, and use of the Internet
for the benefit of all people throughout the world. It plays a crucial role
in shaping Internet standards, policy, and education. Here are the key
aspects of the Internet Society:
History and Mission
• Founded: ISOC was founded in 1992 by Vint Cerf and Bob Kahn,
two of the key figures in the development of the Internet's TCP/IP
protocols.
• Mission: To promote the open development, evolution, and use
of the Internet for the benefit of all people globally.
Key Activities and Focus Areas
1. Standards Development:
o Support for IETF: ISOC supports the Internet Engineering
Task Force (IETF), which develops and promotes voluntary
Internet standards, particularly the standards that
comprise the Internet protocol suite (TCP/IP).
o Technical Standards: Ensuring the Internet’s technical
standards remain open and accessible.
2. Policy Advocacy:
o Internet Governance: ISOC engages in global policy
discussions, advocating for policies that ensure the open
and transparent development of the Internet.
o Privacy and Security: Promoting policies and practices
that enhance the privacy and security of Internet users.
3. Education and Capacity Building:
o Training and Workshops: Providing education and training
to help individuals and organizations understand and use
Internet technologies.
o Community Engagement: Working with local communities
to build the skills and infrastructure needed to support
Internet development.
4. Internet Access and Inclusion:
o Bridging the Digital Divide: Initiatives aimed at expanding
Internet access in underserved and unserved areas,
promoting digital inclusion.
o Global Initiatives: Projects like Internet exchange points
(IXPs) to improve connectivity and reduce costs in various
regions.
5. Advocacy for an Open Internet:
o Net Neutrality: Supporting principles of net neutrality to
ensure that Internet traffic is treated equally without
discrimination.
o Open Standards and Protocols: Advocating for the
adoption of open standards to ensure interoperability and
innovation.
Structure and Governance
• Board of Trustees: ISOC is governed by a Board of Trustees,
which is responsible for overseeing the organization’s activities
and strategic direction.
• Chapters and Members: ISOC has a global network of chapters
and members, including individual members and organizational
members, who participate in its activities and initiatives.
• Collaborations: Collaborates with other organizations,
governments, and the private sector to advance its mission.
Major Initiatives
• Global Internet Report: Annual reports that analyze key trends
affecting the Internet’s growth and development.
• InterCommunity: A global forum for members to engage with
each other and discuss important Internet issues.
• Internet Governance Forum (IGF): Participation and support for
the IGF, a multi-stakeholder platform for discussing Internet
governance issues.
Impact
• Shaping the Internet: ISOC has played a pivotal role in shaping
the development and governance of the Internet, advocating for
its open and inclusive nature.
• Educational Resources: Provided extensive resources and
training to build Internet-related knowledge and skills globally.
• Policy Influence: Influenced policy decisions at national and
international levels to support the growth and openness of the
Internet.
The Internet Society continues to be a key player in ensuring the
Internet remains a global resource that is open, secure, and accessible
to all, promoting an inclusive and informed digital society.
Regulations of Internet
The regulation of cyberspace involves the development and
enforcement of laws, policies, and norms that govern activities
conducted online. These regulations are designed to ensure security,
privacy, and ethical behavior in digital environments while balancing
the need for innovation and free expression. Key areas of focus in
cyberspace regulation include cybersecurity, data protection,
intellectual property, content moderation, and international
cooperation.
Key Areas of Cyberspace Regulation
1. Cybersecurity
o Laws and Policies: Governments enact laws to protect
critical infrastructure, prevent cyberattacks, and ensure the
security of digital systems.
o Standards and Best Practices: Organizations like the
National Institute of Standards and Technology (NIST)
develop frameworks to guide cybersecurity practices.
o Enforcement: Agencies such as the Cybersecurity and
Infrastructure Security Agency (CISA) in the U.S. enforce
cybersecurity regulations and provide guidance.
2. Data Protection and Privacy
o Regulations: Laws such as the General Data Protection
Regulation (GDPR) in the EU and the California Consumer
Privacy Act (CCPA) in the U.S. protect individuals' personal
data and privacy rights.
o Compliance: Organizations must implement measures to
comply with data protection laws, including data breach
notification requirements and user consent mechanisms.
o International Standards: Cross-border data transfer
regulations ensure data protection standards are
maintained internationally.
3. Intellectual Property
o Copyright and Trademarks: Laws protect intellectual
property rights to prevent unauthorized use and distribution
of digital content.
o Digital Rights Management (DRM): Technologies are used
to control access to copyrighted materials.
o Enforcement: Agencies and organizations monitor and
take action against online piracy and intellectual property
violations.
4. Content Moderation
o Platform Policies: Social media and content platforms
establish guidelines for acceptable content and use
automated and human moderation to enforce these
policies.
o Legal Requirements: Governments may impose
regulations requiring the removal of illegal content, such as
hate speech, misinformation, and child exploitation
material.
o Free Speech: Balancing content moderation with the
protection of free speech is a critical challenge.
5. Cybercrime
o Laws and Treaties: National laws and international
treaties, such as the Budapest Convention on Cybercrime,
aim to combat cybercrime and facilitate cooperation
between countries.
o Law Enforcement: Specialized cybercrime units within law
enforcement agencies investigate and prosecute
cybercriminals.
o Collaboration: International cooperation is essential for
addressing cross-border cybercrime.
6. E-Commerce and Consumer Protection
o Regulations: Laws ensure fair trading practices, protect
consumers from fraud, and establish rules for online
transactions.
o Payment Security: Regulations like the Payment Card
Industry Data Security Standard (PCI DSS) ensure the
security of online payment systems.
o Consumer Rights: Legislation protects consumer rights in
online purchases, including returns, refunds, and data
protection.
International Cooperation
• Global Organizations: Bodies like the United Nations,
International Telecommunication Union (ITU), and the Internet
Governance Forum (IGF) facilitate international dialogue and
cooperation on cyberspace regulation.
• Treaties and Agreements: Countries enter into treaties and
agreements to harmonize cybersecurity laws, protect data across
borders, and combat cybercrime collectively.
• Multistakeholder Approach: Involving governments, private
sector, civil society, and technical community in policy-making to
ensure diverse perspectives and expertise.
Challenges and Considerations
• Jurisdiction: The global nature of the Internet complicates
jurisdictional issues, requiring international cooperation and
harmonization of laws.
• Balancing Security and Privacy: Ensuring robust cybersecurity
while protecting individual privacy rights is a complex balancing
act.
• Innovation vs. Regulation: Over-regulation can stifle innovation,
while under-regulation can lead to insecurity and misuse of digital
technologies.
• Ethical Concerns: Ethical considerations, such as algorithmic
bias and the impact of AI on society, are increasingly important in
the regulation of cyberspace.
The regulation of cyberspace is a dynamic and evolving field, requiring
continuous adaptation to new technologies and emerging threats.
Effective regulation ensures a secure, fair, and open digital
environment that supports innovation and protects the rights of
individuals and organizations.

You might also like