CS - PPT - 4 Ii

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Cyber Security

Ms. Heena Karbhari, Cyber Security Trainer


Techdefence Labs and Solutions

VAISHALEE JOISHAR 1
UNIT-4 II

Brief History About Internet


Internet
• The Internet is the foremost important tool and the prominent resource that is
being used by almost every person across the globe. It connects millions of
computers, webpages, websites, and servers. Using the internet we can
send emails, photos, videos, and messages to our loved ones.
• In other words, the Internet is a widespread interconnected network of
computers and electronic devices(that support Internet).
• It creates a communication medium to share and get information online. If
your device is connected to the Internet then only you will be able to access
all the applications, websites, social media apps, and many more services.
• The Internet nowadays is considered the fastest medium for sending and
receiving information.
History of Internet
History of Internet
• In the beginning … there was no Internet.
• In fact, the original concept of an Internet did not include commerce, global connectivity, or
public usage.
• The initial concept of such was derived due to government suspicion and social hysteria during
1960s.
• The threat of nuclear war and mass destruction was such that government entities focused on
developing electroniccommunication systems that would be capable of working successfully
even if large portions were somehow destroyed.
• The beginning was a project of the Advanced Research Project Agency Network (ARPANet)
sponsored in 1969 by the Department of Defense.
• It was primarily designed to overcome threats from a blackout of communication in the event
of a nuclear war.
• This computer network linked four universities (UCLA, Stanford, UC Santa Barbara, and the
University of Utah) and was intended to facilitate communications between computers over
phone lines regardless of system characteristics.
History of Internet
• Initially used by researchers, engineers, computer experts, and the like, the system
proved to be rather complicated. Interactive sessions were not possible.
• The first RFC (RFC0001) was written on April 7, 1969. There are now well over 2000
RFCs, describing every aspect of how the Internet functions.
• ARPANet was opened to nonmilitary users later in the 1970s.
• International connections (i.e., outside America) started in 1972, but the “Internet” was
still just a way for computers to talk to each other and for research into networking;
there was no World WideWeb and no e-mail as we now know it.
• By the mid-1980s, this network was further expanded with the introduction of the NSF
Net, established under the National Science Foundation by a small group of super
computer research centers and researchers at remote academic and governmental
• institusions.
History of Internet
• This network was highly supported by the government, which encouraged
researchers and institutions to avail themselves of this communication tool. This
collaboration led to the development of both online and offline computer communities,
as well as the creation of a myriad of software which included :

1. UNIX OS (developed by Bell Laboratories).


2. Mosaic Interface (a multimedia interface for
information retrieval).
3. Eudora (an e-mail system), contributed by the
University of Illinois.
4. Gopher (information retrieval tool), contributed by the
University of Minnesota.
5. Pine (e-mail), University of Washington.
6. CU-SeeMe (low-cost video conferencing), Cornell.
History of Internet ​
• By the mid-1980s, the Commercial Internet Xchange (CIX) had emerged, and
midlevel networks were leasing data circuits from phone companies and subleasing
them to institutions. Eventually, this small network had expanded into networks of
networks, until the contemporary phenomenon known as the Internet emerged.
• The concept of “domain names” (e.g., www.microsoft.com) was first introduced in
1984. Prior to this introduction, computers were simply accessed by their IP
addresses (numbers).
• World Wide Web is a collection of hyperlinked pages of information distributed over
the Internet via a network protocol called hypertext transfer protocol (HTTP). This was
invented in 1989 by Tim Berners-Lee, a physicist working at CERN, the European
Particle Physics Laboratory, who created the Web so that physicists could share
information about their research. Thus, the Web was introduced as a restricted means
of communication between scientists. Although it was originally a text-only medium,
graphics were soon introduced with a browser called NCSA Mosaic. Both Microsoft’s
Internet Explorer and Netscape were originally based on NCSA Mosaic.
• This graphical interface opened up the Internet to Beginner users and in 1993.
History of Internet
• Prior to the developments, the computers were connected at universities and other
large organizations that could afford to wire cables between each other to transfer the
data over.
• Currently, there are several quick and inexpensive ways to connect to the Internet. At
the minimum, users simply need a computer, a modem, a telephone line, and inter
computer communication software. These basics allow users to connect via ISPs.
• New trends, however, reveal that consumers are increasingly attracted to service-
oriented ISPs, sometimes referred to as “online service providers (OSPs).”
• The Internet has grown exponentially in the past three decades.
• Users’ interests range from real-time information (i.e., scores of sporting events,
current stock prices, etc.) to transactional services (i.e., banking, airline reservations,
etc.) to entertainment (i.e., horoscopes, movie reviews, etc).
• Such popularity has also emerged due to the multitude of communications media,
including e-mail, bulletin boards, newsgroups, or the most popular, the World Wide
Web.
RECOGNIZING AND DEFINING COMPUTER CRIME
• There are three general categories of computer
crime: targets, means, and incidentals. For
example, insiders may target a computer system
for destruction due to perceptions of mistreatment,
and, at the same time, may use the computer as a
means of committing embezzlement.
• In hacking activities, one computer provides the
means for the criminal activity, while another
serves as the target.
RECOGNIZING AND DEFINING COMPUTER CRIME
• In fact, not all crimes involving computers can be characterizedas “computer crime.”
• It would be inappropriate, for example, to categorize a residential burglary as a computer
crime, even if a computer was among the items stolen. At the same time, the hijacking of an
entire shipment of computer hard drives is more appropriately situated elsewhere.
• hacking is most properly denoted as a “cybercrime.”
• A general term that has been used to denote any criminal act which has been facilitated by
computer use. Such generalization has included both Internet and non-Internet activity.
Examples include theft of components, counterfeiting, digital piracy or copyright
infringement, hacking, and child pornography.
COMPUTER AS A TARGET CONTAMINANTS AND
DESTRUCTION OF DATA
• Crimes in which the computer is the target include the theft of intellectual property or
marketing information, blackmail, or sabotage of operating systems and programs. In all of
these crimes, the offender uses the computer to obtain information or to damage operating
programs.
• When a computer is the target of crime, the attacker attacks the computer by breaking into
it or attacking it from outside.
• This is the most professional as comparing to cybercrime, because the criminal does
programming and makes use of some exploits on computer, who always has pretty strong
professional background of computer science.
COMPUTER AS A TARGET CONTAMINANTS AND
DESTRUCTION OF DATA
• When a computer is the target of crime, the attacker attacks the computer by breaking into
it or attacking it from outside.
• This is the most professional as comparing to cybercrime, because the criminal does
programming and makes use of some exploits on computer, who always has pretty strong
professional background of computer science.
• This type of cyber-crimes are committed only by a selected group of cyber criminals.
• These crimes require the technical knowledge of the cyber criminals as compared to crimes
using the computer as a tool.
COMPUTER AS A TARGET CONTAMINANTS AND
DESTRUCTION OF DATA
• The main purpose of committing these cybercrimes is to directly cause damage to a
computer system or to access the important data stored in a computer.
• This includes stealing data or information from system, theft of computer software,
blackmailing based on persons information gained from computer etc.
i) Intellectual Property Theft;
ii) Marketable information theft;
iii) Theft of data/information;
iv) Sabotage of computer, computer system or computer networks;
v) Unlawful access to government records and criminal justice etc.
INDIAN IT ACT 2000
• Cybercrimes are punishable under two categories: the ITA 2000 and the IPC.
• Indian IT 2000 was published in the year 2000 with the purpose of providing legal
recognition for transactions carried out by means of electronic data interchange and other
means of electronic communication, commonly referred to as electronic commerce.
• ITA 2000 lists a number of activities that may be taken to constitute cybercrimes. This
includes tampering with computer source code, hacking, publishing, or transmitting any
information in electronic form that is lascivious, securing access to a protected system, and
breach of confidentiality and privacy.
• The key provisions under the Indian ITA 2000:
INDIAN IT ACT 2000
www.paruluniversity.ac.in
VAISHALEE JOISHAR 17

You might also like