You are on page 1of 11

Cyberspace.

Ashish Mishra
Cyberspace refers to the virtual computer world, and more specifically, an electronic
medium that is used to facilitate online communication. Cyberspace typically involves
a large computer network made up of many worldwide computer subnetworks that
employ TCP/IP protocol to aid in communication and data exchange activities.
Cyberspace allows users to share information, interact, swap ideas, play games, engage in discussions
or social forums, conduct business and create intuitive media, among many other activities.
The term cyberspace was initially introduced by William Gibson in his 1984 book, Neuromancer.
Gibson criticized the term in later years, calling it “evocative and essentially meaningless.”
Nevertheless, the term is still widely used to describe any facility or feature that is linked to the
Internet. People use the term to describe all sorts of virtual interfaces that create digital realities.

Cyber ​s ecurity is about data Cyber ​s ecurity is about data


protection from unauthorized protection from unauthorized
modification, unauthorized modification, unauthorized
access, and data corruption. access, and data corruption.

Application Security

Short Explanation
of Cyber ​Security
Concept
Cyber ​s ecurity is about data protection from
unauthorized modification, unauthorized
access, and data corruption.
Contributing,
Professional, And
Achievement For
Society In Cyber ​
Security Field
Cyber ​s ecurity is about data protection from
unauthorized modification, unauthorized
access, and data corruption.

Cyber ​s ecurity is about data protection from


unauthorized modification, unauthorized
access, and data corruption.

www.reallygreatsite.com
Operational Security

Cyber ​s ecurity is about data protection from


unauthorized modification, unauthorized
access, and data corruption.

Operational Security

Cyber ​s ecurity is about data protection from


unauthorized modification, unauthorized
access, and data corruption.

Operational Security
Important Elements To Consider
In Running Cyber ​Security Cyber ​s ecurity is about data protection from
unauthorized modification, unauthorized
Cyber ​s ecurity is about data protection from unauthorized access, and data corruption.
modification, unauthorized access, and data corruption.
Operational Security

Cyber ​s ecurity is about data Cyber ​s ecurity is about data


protection from unauthorized protection from unauthorized
modification, unauthorized modification, unauthorized
access, and data corruption. access, and data corruption.

Cyber ​Security Benefits for


Individuals and Companies
Securing the central government network by setting
clear security targets and placing government
agencies accountable to meet these targets.
Some Cyber ​Security Tips
For Businesses That Must
Know
Operational Security

Social engineering by exploiting psychology and


encouraging it to provide information and access
to its tools

Operational Security

Social engineering by exploiting psychology and


encouraging it to provide information and access
to its tools
OPPORTUNITY

Social Engineering By
Exploiting Psychology And
Encouraging It To Provide
Information And Access To
Its Tools
Social engineering by exploiting
psychology and encouraging it to
provide information and access
Operational Security
to its tools

Social engineering by exploiting psychology and


encouraging it to provide information and access
to its tools
Operational Security

Social engineering by exploiting psychology and


encouraging it to provide information and access
to its tools

Social engineering by exploiting psychology and


encouraging it to provide information and access
to its tools

COMPANY THREAT

Several Types Of Threats


To Be Wary Of Against
Cyber Security That Has
Many Motives, Including
Social engineering by exploiting psychology
and encouraging it to provide information
and access to its tools
Thank You

Ashish Mishra

You might also like