Professional Documents
Culture Documents
1
ORIGINS OF INTERNET AND WWW
The internet is a globally connected network system that transmit data via
various types of media.
The first workable prototype of the Internet came in the late 1960s with the
creation of ARPANET, or the Advanced Research Projects Agency
Network.
Originally funded by the U.S. Department of Defense, ARPANET used
packet switching to allow multiple computers to communicate on a single
network.
English scientist Tim Berners-Lee invented the World Wide Web in 1989.
He wrote the first web browser in 1990 while employed at The European
Organization for Nuclear Research (CERN) near Geneva, Switzerland.
The terms internet and World Wide Web are often used interchangeably, but
they are not exactly the same thing;
the internet refers to the global communication system, including hardware
and infrastructure, while the web is one of the services communicated over
the internet.
THREAT IN CYBERSPACE
A cyber or cybersecurity threat is a malicious act that seeks to damage data,
steal data, or disrupt digital life in general.
Cyber threats also refer to the possibility of a successful cyber attack that
aims to gain unauthorized access, damage, disrupt, or steal an information
technology asset, computer network, intellectual property, or any other form
of sensitive data.
Common cyber threats include:
1. Malware: Malware (malicious software) is software that has been
specifically designed to perform malicious tasks on a device or network,
such as corrupting data or taking control of a system.
2. Spyware: Spyware is a form of malware that hides on a device providing
real-time information sharing to its host, enabling them to steal data like
bank details and passwords.
3. Phishing Attacks :Phishing attacks are when a cybercriminal attempts to
lure individuals into providing sensitive data such as personally
identifiable information (PII), banking and credit card details, and
passwords.
4. Distributed Denial of Service (DDoS) Attacks :Distributed denial of
service attacks aim to disrupt a computer network by flooding the
network with superfluous requests from a botnet to overload the system
and prevent legitimate requests from being fulfilled.
2
CYBER SPACE LAW IN INIDA
In India, cyber laws are contained in the Information Technology Act, 2000
(“IT Act”) which came into force on October 17, 2000.
The main purpose of the Act is to provide legal recognition to electronic
commerce and to facilitate filing of electronic records with the Government.
In terms of cybersecurity, there are five main types of laws that must be
followed.
Cyber laws are becoming increasingly important in countries such as India
which have extremely extensive internet use.
There are strict laws that govern the use of cyberspace and supervise the use
of information, software, electronic commerce, and financial transactions in
the digital environment.
India’s cyber laws have helped to enable electronic commerce and electronic
governance to flourish in India by safeguarding maximum connectivity and
minimizing security concerns.
This has also made digital media accessible in a wider range of applications
and enhanced its scope and effectiveness.
CONCLUSION