Cyberspace and Cyber
Crimes UNIT 3 CYBERSPACE AND CYBER CRIMES
Structure
3.0 Introduction
3.1 Objectives
3.2 Real Space Vs Cyberspace
3.3 Digital Identity: An Overview
3.4 Verifying Vs. Revealing an Identity
3.5 Cyber and Computer Crimes
3.6 Architecture of Cyberspace
3.7 Preventing Crimes
3.8 Implications of Choosing the Link System
3.9 Road to Implementation
3.10 Summary
3.11 Solutions / Answers
3.12 Further Readings
3.0 INTRODUCTION
Cyberspace is such a term, which is not yet completely defined and also has no
geographical limitation. It is a term associated with application of the Internet
worldwide. It is also called as a virtual space as physical existence of cyberspace is
not detectable at all. Cyberspace is “the total interconnectedness of human beings
through computers and telecommunication without regard to physical geography.
Cyberspace is a term coined by science fiction author William Gibson to describe the
whole range of information resources available through computer networks. For our
purposes, cyberspace is a realm in which communication and interaction between two
individuals or between an individual and a computer is facilitated by digital data
exchanged over computer networks. This interaction or communication can be used
for a host of different purposes.
The Internet is currently the biggest network for linking computers, but cyberspace, as
a concept, is independent of the Internet. Cyberspace communication began before the
Internet and the World Wide Web, and cyberspace interaction and communication
will continue to take place after the Internet is no longer the network of choice.
Currently there is no generic system for identification in cyberspace. It is not possible
to absolutely identify an entity or to accurately tell whether an object has a specific
characteristic. Digital environments have inherent differences from real space which
causes this discrepancy, and when implementing an identity system for cyberspace
one needs to consider more than just the architectural nature of the system any system
chosen will have the social repercussions which need to be also taken into account.
Identity is a unique piece of information associated with an entity. Identity itself is
simply a collection of characteristics which are either inherent or are assigned by
another. The colour of a person’s hair is good or bad and whether he is attractive or
not is part of a person’s identity which is usually reviewed by another person.
Interactions done in real space inherently carry the identity of the person originating
the transaction. Generally, physical traits are carried along in a transaction for
32
, Cyberspace and Cyber example when one purchase a book from a book store, the book dealer may remember
Crimes the buyer’s face or build.
In this unit, we will study about the cyberspace, difference between real space and
cyberspace, digital identity, cyber crimes and their prevention mechanisms.
3.1 OBJECTIVES
After studying this unit, you should be able to:
• describe what is Cyberspace;
• explain the difference between Real Space and Cyberspace;
• explain the concept of Digital Identity;
• describe Computer and Cyber Crimes;
• describe the architecture of Cyberspace;
• state implications of choosing the link system; and
• list the barriers before cyberspace identity mechanism.
3.2 REAL SPACE Vs CYBERSPACE
The difference between real space and cyberspace is that the essence of any digital
transaction is unbundling. Ones and zeros do not inherently carry any separate
information along with them; a real space transaction carries along inseparable
secondary information. Digital transmissions can only transmit; there is no secondary
information encoded in the transmission unless explicitly put there. Thus, for
authentication purposes, additional information needs to be carried with cyberspace
transactions for identity purposes.
Providing extra information in digital communication introduces the possibility for
identity theft as nothing can prevent the transmission of false identity information, or
the duplication of another’s identity information. To prevent these problems, the
actual identity must not be transmitted along with the message; instead a verification
scheme needs to be used to convince the recipient that the message was actually sent
by the sender. This eliminates the need to send one’s actual identity. The concept of
verifying instead of revealing provides an extra layer of security to the sender.
The other point of insecurity is in the digital certificates which were issued to verify
these characteristics. These certificates are meant to be used only by their owner, but
if another party obtains them, then that party can falsify his identity, representing him
as the individual for whom he has digital certificates.
Architecturally, we must decide how to store and use these certificates. The
certificates can be stored on a smart card for use on a computer terminal, or the
certificates can be stored in an “identity server” locked via password or biometrics
information and available for transmission over the Internet.
In real space, it is difficult to select, to verify or reveal portions of one’s identity: most
forms of identification contain more information than is needed for any transaction.
The unbundling that is possible in cyberspace allows portions of identity to be
disassociated and verified by a third party.
This not only creates the ability to verify via the least revealing means, but it also
creates the framework for anonymous transactions. It is possible to merely verify the
33
Crimes UNIT 3 CYBERSPACE AND CYBER CRIMES
Structure
3.0 Introduction
3.1 Objectives
3.2 Real Space Vs Cyberspace
3.3 Digital Identity: An Overview
3.4 Verifying Vs. Revealing an Identity
3.5 Cyber and Computer Crimes
3.6 Architecture of Cyberspace
3.7 Preventing Crimes
3.8 Implications of Choosing the Link System
3.9 Road to Implementation
3.10 Summary
3.11 Solutions / Answers
3.12 Further Readings
3.0 INTRODUCTION
Cyberspace is such a term, which is not yet completely defined and also has no
geographical limitation. It is a term associated with application of the Internet
worldwide. It is also called as a virtual space as physical existence of cyberspace is
not detectable at all. Cyberspace is “the total interconnectedness of human beings
through computers and telecommunication without regard to physical geography.
Cyberspace is a term coined by science fiction author William Gibson to describe the
whole range of information resources available through computer networks. For our
purposes, cyberspace is a realm in which communication and interaction between two
individuals or between an individual and a computer is facilitated by digital data
exchanged over computer networks. This interaction or communication can be used
for a host of different purposes.
The Internet is currently the biggest network for linking computers, but cyberspace, as
a concept, is independent of the Internet. Cyberspace communication began before the
Internet and the World Wide Web, and cyberspace interaction and communication
will continue to take place after the Internet is no longer the network of choice.
Currently there is no generic system for identification in cyberspace. It is not possible
to absolutely identify an entity or to accurately tell whether an object has a specific
characteristic. Digital environments have inherent differences from real space which
causes this discrepancy, and when implementing an identity system for cyberspace
one needs to consider more than just the architectural nature of the system any system
chosen will have the social repercussions which need to be also taken into account.
Identity is a unique piece of information associated with an entity. Identity itself is
simply a collection of characteristics which are either inherent or are assigned by
another. The colour of a person’s hair is good or bad and whether he is attractive or
not is part of a person’s identity which is usually reviewed by another person.
Interactions done in real space inherently carry the identity of the person originating
the transaction. Generally, physical traits are carried along in a transaction for
32
, Cyberspace and Cyber example when one purchase a book from a book store, the book dealer may remember
Crimes the buyer’s face or build.
In this unit, we will study about the cyberspace, difference between real space and
cyberspace, digital identity, cyber crimes and their prevention mechanisms.
3.1 OBJECTIVES
After studying this unit, you should be able to:
• describe what is Cyberspace;
• explain the difference between Real Space and Cyberspace;
• explain the concept of Digital Identity;
• describe Computer and Cyber Crimes;
• describe the architecture of Cyberspace;
• state implications of choosing the link system; and
• list the barriers before cyberspace identity mechanism.
3.2 REAL SPACE Vs CYBERSPACE
The difference between real space and cyberspace is that the essence of any digital
transaction is unbundling. Ones and zeros do not inherently carry any separate
information along with them; a real space transaction carries along inseparable
secondary information. Digital transmissions can only transmit; there is no secondary
information encoded in the transmission unless explicitly put there. Thus, for
authentication purposes, additional information needs to be carried with cyberspace
transactions for identity purposes.
Providing extra information in digital communication introduces the possibility for
identity theft as nothing can prevent the transmission of false identity information, or
the duplication of another’s identity information. To prevent these problems, the
actual identity must not be transmitted along with the message; instead a verification
scheme needs to be used to convince the recipient that the message was actually sent
by the sender. This eliminates the need to send one’s actual identity. The concept of
verifying instead of revealing provides an extra layer of security to the sender.
The other point of insecurity is in the digital certificates which were issued to verify
these characteristics. These certificates are meant to be used only by their owner, but
if another party obtains them, then that party can falsify his identity, representing him
as the individual for whom he has digital certificates.
Architecturally, we must decide how to store and use these certificates. The
certificates can be stored on a smart card for use on a computer terminal, or the
certificates can be stored in an “identity server” locked via password or biometrics
information and available for transmission over the Internet.
In real space, it is difficult to select, to verify or reveal portions of one’s identity: most
forms of identification contain more information than is needed for any transaction.
The unbundling that is possible in cyberspace allows portions of identity to be
disassociated and verified by a third party.
This not only creates the ability to verify via the least revealing means, but it also
creates the framework for anonymous transactions. It is possible to merely verify the
33