The document provides a brief history of the internet. It discusses how the internet began as a US government-funded network called ARPANET to enable communication between universities in case of nuclear war. It then expanded to include other academic and research institutions. Key developments included email, domains, browsers, and the World Wide Web. The internet now connects millions worldwide for communication, information sharing, and other purposes. It has grown exponentially from its origins as a small network for researchers.
The document provides a brief history of the internet. It discusses how the internet began as a US government-funded network called ARPANET to enable communication between universities in case of nuclear war. It then expanded to include other academic and research institutions. Key developments included email, domains, browsers, and the World Wide Web. The internet now connects millions worldwide for communication, information sharing, and other purposes. It has grown exponentially from its origins as a small network for researchers.
The document provides a brief history of the internet. It discusses how the internet began as a US government-funded network called ARPANET to enable communication between universities in case of nuclear war. It then expanded to include other academic and research institutions. Key developments included email, domains, browsers, and the World Wide Web. The internet now connects millions worldwide for communication, information sharing, and other purposes. It has grown exponentially from its origins as a small network for researchers.
The document provides a brief history of the internet. It discusses how the internet began as a US government-funded network called ARPANET to enable communication between universities in case of nuclear war. It then expanded to include other academic and research institutions. Key developments included email, domains, browsers, and the World Wide Web. The internet now connects millions worldwide for communication, information sharing, and other purposes. It has grown exponentially from its origins as a small network for researchers.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 17
Cyber Security
Ms. Heena Karbhari, Cyber Security Trainer
Techdefence Labs and Solutions
VAISHALEE JOISHAR 1 UNIT-4 II
Brief History About Internet
Internet • The Internet is the foremost important tool and the prominent resource that is being used by almost every person across the globe. It connects millions of computers, webpages, websites, and servers. Using the internet we can send emails, photos, videos, and messages to our loved ones. • In other words, the Internet is a widespread interconnected network of computers and electronic devices(that support Internet). • It creates a communication medium to share and get information online. If your device is connected to the Internet then only you will be able to access all the applications, websites, social media apps, and many more services. • The Internet nowadays is considered the fastest medium for sending and receiving information. History of Internet History of Internet • In the beginning … there was no Internet. • In fact, the original concept of an Internet did not include commerce, global connectivity, or public usage. • The initial concept of such was derived due to government suspicion and social hysteria during 1960s. • The threat of nuclear war and mass destruction was such that government entities focused on developing electroniccommunication systems that would be capable of working successfully even if large portions were somehow destroyed. • The beginning was a project of the Advanced Research Project Agency Network (ARPANet) sponsored in 1969 by the Department of Defense. • It was primarily designed to overcome threats from a blackout of communication in the event of a nuclear war. • This computer network linked four universities (UCLA, Stanford, UC Santa Barbara, and the University of Utah) and was intended to facilitate communications between computers over phone lines regardless of system characteristics. History of Internet • Initially used by researchers, engineers, computer experts, and the like, the system proved to be rather complicated. Interactive sessions were not possible. • The first RFC (RFC0001) was written on April 7, 1969. There are now well over 2000 RFCs, describing every aspect of how the Internet functions. • ARPANet was opened to nonmilitary users later in the 1970s. • International connections (i.e., outside America) started in 1972, but the “Internet” was still just a way for computers to talk to each other and for research into networking; there was no World WideWeb and no e-mail as we now know it. • By the mid-1980s, this network was further expanded with the introduction of the NSF Net, established under the National Science Foundation by a small group of super computer research centers and researchers at remote academic and governmental • institusions. History of Internet • This network was highly supported by the government, which encouraged researchers and institutions to avail themselves of this communication tool. This collaboration led to the development of both online and offline computer communities, as well as the creation of a myriad of software which included :
1. UNIX OS (developed by Bell Laboratories).
2. Mosaic Interface (a multimedia interface for information retrieval). 3. Eudora (an e-mail system), contributed by the University of Illinois. 4. Gopher (information retrieval tool), contributed by the University of Minnesota. 5. Pine (e-mail), University of Washington. 6. CU-SeeMe (low-cost video conferencing), Cornell. History of Internet • By the mid-1980s, the Commercial Internet Xchange (CIX) had emerged, and midlevel networks were leasing data circuits from phone companies and subleasing them to institutions. Eventually, this small network had expanded into networks of networks, until the contemporary phenomenon known as the Internet emerged. • The concept of “domain names” (e.g., www.microsoft.com) was first introduced in 1984. Prior to this introduction, computers were simply accessed by their IP addresses (numbers). • World Wide Web is a collection of hyperlinked pages of information distributed over the Internet via a network protocol called hypertext transfer protocol (HTTP). This was invented in 1989 by Tim Berners-Lee, a physicist working at CERN, the European Particle Physics Laboratory, who created the Web so that physicists could share information about their research. Thus, the Web was introduced as a restricted means of communication between scientists. Although it was originally a text-only medium, graphics were soon introduced with a browser called NCSA Mosaic. Both Microsoft’s Internet Explorer and Netscape were originally based on NCSA Mosaic. • This graphical interface opened up the Internet to Beginner users and in 1993. History of Internet • Prior to the developments, the computers were connected at universities and other large organizations that could afford to wire cables between each other to transfer the data over. • Currently, there are several quick and inexpensive ways to connect to the Internet. At the minimum, users simply need a computer, a modem, a telephone line, and inter computer communication software. These basics allow users to connect via ISPs. • New trends, however, reveal that consumers are increasingly attracted to service- oriented ISPs, sometimes referred to as “online service providers (OSPs).” • The Internet has grown exponentially in the past three decades. • Users’ interests range from real-time information (i.e., scores of sporting events, current stock prices, etc.) to transactional services (i.e., banking, airline reservations, etc.) to entertainment (i.e., horoscopes, movie reviews, etc). • Such popularity has also emerged due to the multitude of communications media, including e-mail, bulletin boards, newsgroups, or the most popular, the World Wide Web. RECOGNIZING AND DEFINING COMPUTER CRIME • There are three general categories of computer crime: targets, means, and incidentals. For example, insiders may target a computer system for destruction due to perceptions of mistreatment, and, at the same time, may use the computer as a means of committing embezzlement. • In hacking activities, one computer provides the means for the criminal activity, while another serves as the target. RECOGNIZING AND DEFINING COMPUTER CRIME • In fact, not all crimes involving computers can be characterizedas “computer crime.” • It would be inappropriate, for example, to categorize a residential burglary as a computer crime, even if a computer was among the items stolen. At the same time, the hijacking of an entire shipment of computer hard drives is more appropriately situated elsewhere. • hacking is most properly denoted as a “cybercrime.” • A general term that has been used to denote any criminal act which has been facilitated by computer use. Such generalization has included both Internet and non-Internet activity. Examples include theft of components, counterfeiting, digital piracy or copyright infringement, hacking, and child pornography. COMPUTER AS A TARGET CONTAMINANTS AND DESTRUCTION OF DATA • Crimes in which the computer is the target include the theft of intellectual property or marketing information, blackmail, or sabotage of operating systems and programs. In all of these crimes, the offender uses the computer to obtain information or to damage operating programs. • When a computer is the target of crime, the attacker attacks the computer by breaking into it or attacking it from outside. • This is the most professional as comparing to cybercrime, because the criminal does programming and makes use of some exploits on computer, who always has pretty strong professional background of computer science. COMPUTER AS A TARGET CONTAMINANTS AND DESTRUCTION OF DATA • When a computer is the target of crime, the attacker attacks the computer by breaking into it or attacking it from outside. • This is the most professional as comparing to cybercrime, because the criminal does programming and makes use of some exploits on computer, who always has pretty strong professional background of computer science. • This type of cyber-crimes are committed only by a selected group of cyber criminals. • These crimes require the technical knowledge of the cyber criminals as compared to crimes using the computer as a tool. COMPUTER AS A TARGET CONTAMINANTS AND DESTRUCTION OF DATA • The main purpose of committing these cybercrimes is to directly cause damage to a computer system or to access the important data stored in a computer. • This includes stealing data or information from system, theft of computer software, blackmailing based on persons information gained from computer etc. i) Intellectual Property Theft; ii) Marketable information theft; iii) Theft of data/information; iv) Sabotage of computer, computer system or computer networks; v) Unlawful access to government records and criminal justice etc. INDIAN IT ACT 2000 • Cybercrimes are punishable under two categories: the ITA 2000 and the IPC. • Indian IT 2000 was published in the year 2000 with the purpose of providing legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as electronic commerce. • ITA 2000 lists a number of activities that may be taken to constitute cybercrimes. This includes tampering with computer source code, hacking, publishing, or transmitting any information in electronic form that is lascivious, securing access to a protected system, and breach of confidentiality and privacy. • The key provisions under the Indian ITA 2000: INDIAN IT ACT 2000 www.paruluniversity.ac.in VAISHALEE JOISHAR 17