Cyber Space: Data Theft

Read Complete Research Material

Cyber Space: Data Theft



Cyber Space: Data Theft



Chapter 1: Background

Cyberspace has a hybrid character. On the one hand, it depends on the physical infrastructure (servers, fiber-optic cables) are rooted in real geographical space. Instead, so the real impact on the availability of cyberspace. For example, the distance between the particular house and the nearest telephone exchange has an impact on the available DSL bandwidth. Countries like India to be a bottleneck permanent telecommunications because of its poor infrastructure. Cyberspace is characterized by the digital divide. Peripheral regions, especially in poor countries are not so visible in cyberspace (Weber, 1946, 196). On the other hand, cyberspace can be represented as a "virtual world" where time and space seems to have collapsed. Ceteris paribus, given that last milliseconds Internet connections, navigating cyberspace is almost insensitive to geography (Vold, 1998).

With the advent of the Internet, the size of cyberspace in terms of complexity and quantity of data has increased dramatically. In 2009, the Internet was more than 1.7 million users. In 2007, the number of domain names only $ 500 million, Government agencies, companies and individuals who are desperately trying to create and publish digital content on the Internet (e.g., digitization of library catalogs). Thus, the exact size of the web, measured in terabytes of data cannot be measured with reasonable accuracy. Experts often make a distinction between the "surface Web"-part of cyberspace, open to the public, and "invisible" or "Deep Web", which is indexed and is beyond the scope of search engines. In May 2008, the site contains more than 47 billion Web pages. "Deep Web" is several times higher (Torr, 2003b, 12).

The term describes the cyberspace of a global network of interconnected computers and the amount of digital data, which gives access. The word was coined in 1984 by William Gibson in the famous science fiction novel, Neuromancer. Prefix kubernan cyber comes from the Greek, means "sail". The metaphor of navigation, or explore a new virtual world, justified by the huge size and complexity of the Internet and World Wide Web (Web). Access to information and applications are structured in such a way that reproduces the real world. We connect to and travel through the web site. "A growing part of everyday life, at least in rich countries is held connected to the Internet-based applications for business, shopping, games, travel, social events and so on. Cyberspace has been the subject of thousands of books. Wide attempt to capture the complex geography of cyberspace was the Atlas of Cyberspace Martin Dodge and Rob Kitchin.

Chapter 2: Literature Review

Conceptual Framework

Internet Crime History

Internet crimes began in 1960 when the universities and some government agencies and banking institutions have begun to use computers on the network to send text messages, research, finance and accounting. The first computer system of abuse was the students experimented with using them to play and solve problems. The first abuse involved relatively harmless pranks and cracking (i.e., hacking computer systems) to see the files, and sometimes to manipulate ...
Related Ads
  • Computer Crime And Comput...
    www.researchomatic.com...

    When data communications take place at high s ...

  • Data Theft
    www.researchomatic.com...

    Due to the presence of internal threats, data theft ...

  • Privacy And Internet
    www.researchomatic.com...

    The concerns should be high as the data theft ...

  • Cyberbullying
    www.researchomatic.com...

    The technology could either be cyberspace , IM ...