Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Essay

Essay TECHNOLOGY

Rating
-
Sold
-
Pages
12
Grade
A
Uploaded on
27-05-2022
Written in
2020/2021

it explains mostly about cyber crimes and how one can protect themselves from falling prey to cyber attacks.

Institution
Course

Content preview

Cyberspace and Cyber
Crimes UNIT 3 CYBERSPACE AND CYBER CRIMES

Structure

3.0 Introduction
3.1 Objectives
3.2 Real Space Vs Cyberspace
3.3 Digital Identity: An Overview
3.4 Verifying Vs. Revealing an Identity
3.5 Cyber and Computer Crimes
3.6 Architecture of Cyberspace
3.7 Preventing Crimes
3.8 Implications of Choosing the Link System
3.9 Road to Implementation
3.10 Summary
3.11 Solutions / Answers
3.12 Further Readings


3.0 INTRODUCTION

Cyberspace is such a term, which is not yet completely defined and also has no
geographical limitation. It is a term associated with application of the Internet
worldwide. It is also called as a virtual space as physical existence of cyberspace is
not detectable at all. Cyberspace is “the total interconnectedness of human beings
through computers and telecommunication without regard to physical geography.

Cyberspace is a term coined by science fiction author William Gibson to describe the
whole range of information resources available through computer networks. For our
purposes, cyberspace is a realm in which communication and interaction between two
individuals or between an individual and a computer is facilitated by digital data
exchanged over computer networks. This interaction or communication can be used
for a host of different purposes.

The Internet is currently the biggest network for linking computers, but cyberspace, as
a concept, is independent of the Internet. Cyberspace communication began before the
Internet and the World Wide Web, and cyberspace interaction and communication
will continue to take place after the Internet is no longer the network of choice.

Currently there is no generic system for identification in cyberspace. It is not possible
to absolutely identify an entity or to accurately tell whether an object has a specific
characteristic. Digital environments have inherent differences from real space which
causes this discrepancy, and when implementing an identity system for cyberspace
one needs to consider more than just the architectural nature of the system any system
chosen will have the social repercussions which need to be also taken into account.
Identity is a unique piece of information associated with an entity. Identity itself is
simply a collection of characteristics which are either inherent or are assigned by
another. The colour of a person’s hair is good or bad and whether he is attractive or
not is part of a person’s identity which is usually reviewed by another person.

Interactions done in real space inherently carry the identity of the person originating
the transaction. Generally, physical traits are carried along in a transaction ­ for

32

, Cyberspace and Cyber example when one purchase a book from a book store, the book dealer may remember
Crimes the buyer’s face or build.

In this unit, we will study about the cyberspace, difference between real space and
cyberspace, digital identity, cyber crimes and their prevention mechanisms.

3.1 OBJECTIVES

After studying this unit, you should be able to:
• describe what is Cyberspace;
• explain the difference between Real Space and Cyberspace;
• explain the concept of Digital Identity;
• describe Computer and Cyber Crimes;
• describe the architecture of Cyberspace;
• state implications of choosing the link system; and
• list the barriers before cyberspace identity mechanism.


3.2 REAL SPACE Vs CYBERSPACE

The difference between real space and cyberspace is that the essence of any digital
transaction is unbundling. Ones and zeros do not inherently carry any separate
information along with them; a real space transaction carries along inseparable
secondary information. Digital transmissions can only transmit; there is no secondary
information encoded in the transmission unless explicitly put there. Thus, for
authentication purposes, additional information needs to be carried with cyberspace
transactions for identity purposes.

Providing extra information in digital communication introduces the possibility for
identity theft as nothing can prevent the transmission of false identity information, or
the duplication of another’s identity information. To prevent these problems, the
actual identity must not be transmitted along with the message; instead a verification
scheme needs to be used to convince the recipient that the message was actually sent
by the sender. This eliminates the need to send one’s actual identity. The concept of
verifying instead of revealing provides an extra layer of security to the sender.

The other point of insecurity is in the digital certificates which were issued to verify
these characteristics. These certificates are meant to be used only by their owner, but
if another party obtains them, then that party can falsify his identity, representing him
as the individual for whom he has digital certificates.

Architecturally, we must decide how to store and use these certificates. The
certificates can be stored on a smart card for use on a computer terminal, or the
certificates can be stored in an “identity server” locked via password or biometrics
information and available for transmission over the Internet.

In real space, it is difficult to select, to verify or reveal portions of one’s identity: most
forms of identification contain more information than is needed for any transaction.
The unbundling that is possible in cyberspace allows portions of identity to be
disassociated and verified by a third party.

This not only creates the ability to verify via the least revealing means, but it also
creates the framework for anonymous transactions. It is possible to merely verify the
33

Written for

Course

Document information

Uploaded on
May 27, 2022
Number of pages
12
Written in
2020/2021
Type
ESSAY
Professor(s)
Unknown
Grade
A

Subjects

$9.09
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
alexnjuguna

Get to know the seller

Seller avatar
alexnjuguna uon
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions