East African Scholars Journal of Education, Humanities and Literature Abbreviated Key Title: East African Scholars J Edu Humanit Lit ISSN 2617-443X (Print) | ISSN 2617-7250 (Online) | Published By East African Scholars Publisher, Kenya Volume-2 | Issue-3 | March-2019 | Review Article Cyber Space- Evolution and Growth 1 1 Jitender K Malik. , and Dr. Sanjaya Choudhury. 1Research Associate, Department of Law, Bhagwant University, Ajmer ( Raj.) –India *Corresponding Author Jitender K Malik Abstract: With the advent and growth of electronic communication, the word “cyberspace” has entered into everyday parlance. In common parlance, ‘cyberspace’ is the environment in which communication over computer networks occurs. Almost everybody in one way or the other is connected to it: Ladies in the market are connected to it to run their businesses; shepherds are connected to locate their cattle; hunters are connected to it to locate their prey; and our friends in the remote areas are also connected to it. The word “cyberspace” has invaded our collective consciousness like no other. As the technology improves and ownership of home computers increases, one competently navigate his way around cyberspace, downloading information, reading and writing to newsgroups, and receiving and sending emails. Cyberspace represents the new medium of communication, electronic communication, which is fast outmoding, or even replacing, more traditional methods of communication. The present Study attempts a comprehensive definition of the term ‘cyberspace,’ traces out the evolution and growth of cyber space; and enumerates the pros and cons of information technology. Keywords: cyberspace, cyber attacks, communication. INTRODUCTION The term “cyber” has been used to describe William Gibson, who used the word for the almost anything that is connected with networks and first time remarked: “Cyberspace: a consensual computers. Unfortunately, however, there is no hallucination experienced daily by billions of legitimate consensus on what “cyberspace” is. In order to clarify operators, in every nation, by children being taught this situation, Ottis, R. & Lorents offer the following mathematical concepts … A graphic representation of definition: “cyberspace is a time-dependent set of data abstracted from the banks of every computer in the interconnected information systems and the human human system (William, G. 1994)”. These words, users that interact with these systems (Ottis, R. & written by the science fiction writer, introduced the Lorents, 2010)”. They describe the background of the concept of cyberspace into the English language. But definition and show why this approach may be what does cyberspace mean today? There are in fact preferable over others. Specifically, they revisit the two spurs of cyberspace. On the one hand, we have terms coined by Norbert Wiener (the father of virtual reality—a 3-D cyber-spatial environment which cybernetics) and William Gibson. The authors show humans can ‘enter’ and ‘move through’, interacting that time-dependence is an overlooked aspect of cyber with both the computer and other human beings, as space and make a case for including it in their proposed depicted in films like The Lawnmower Man and definition. In addition, they look at the implications that Disclosure. On the other hand, we have the slightly less can be drawn from the time-dependence of cyberspace, dramatic, but more utilitarian, world of networks of especially in regard to cyber conflicts, which they computers linked via cables and routers (similar to define as a confrontation between two or more parties, telephone connections) which enable us to where at least one party uses cyber attacks against the communicate, store and retrieve information. By far the other(s). Specifically the authors review the largest and most well known of these is the Internet— implications on the potential for rapid deployments of originally used for email, ftp (file transfer), bulletin offensive and defensive actions in cyberspace, the boards and newsgroups, and telnet (remote computer feasibility of mapping cyberspace, and the need for access), and now even more of a household name constant patrolling and reconnaissance. courtesy of the World Wide Web, which allows simple Quick Response Code Journal homepage: Copyright @ 2019: This is an open-access http://www.easpublisher.com/easjehl/ article distributed under the terms of the Creative Commons Attribution license which Article History permits unrestricted use, distribution, and Received: 25.02.2018 reproduction in any medium for non Accepted: 15.03.2019 commercial use (NonCommercial, or CC-BY- Published: 29.03.2019 NC) provided the original author and source are credited. Published By East African Scholars Publisher, Kenya 170 Jitender K Malik. & Dr. Sanjaya Choudhury; Scholars J Edu Humanit Lit; Vol-2, Iss-3 (March, 2019): 170-190 stress-free navigation of the network. This second spur network which can be complemented and further of cyberspace encompasses not only the connections expanded by any number of additional data networks. between computers, but also the browser and email IT systems in an isolated virtual space are not part of software which transmits information, plus the internal cyberspace (Cyber Security. 2011). Canada’s Cyber space of the microchip and other electronic storage Security Strategy defines cyberspace as the electronic technologies—the places in which information actually world created by interconnected networks of resides (Rebecca, B. 2001). information technology and the information on those networks. It is a global commons where more than 1.7 The International Telecommunication Union billion people are linked together to exchange ideas, (ITU) states the terms cyberspace, cyber environment services and friendship (Canada’s. 2010). and critical information infrastructure are used interchangeably (Schatz, D. et al.,., 2017). The Although several definitions of cyberspace can definition of cyber world is close to the definition of the be found both in scientific literature and in official cyber environment in ITU-T, which says that the cyber governmental sources, there is no fully agreed official environment ‘includes users, networks, devices, all definition yet. According to F. D. Kramer there are 28 software, processes, information in storage or transit, different definitions of the term cyberspace (FD applications, services, and systems that can be Kramer, S., et al.,., 2009).The most recent draft connected directly or indirectly to networks (ITU-T definition is the following: Cyberspace is a global and X.1205: 2008)’. Hathaway and Klimburg present dynamic domain (subject to constant change) similar thinking when they argue that cyber space characterized by the combined use of electrons and contains people and social interaction in the networks in electromagnetic spectrum, whose purpose is to create, addition to hardware, software and information systems store, modify, exchange, share and extract, use, of the internet (Hathaway, M., & Klimburg, 2012). The eliminate information and disrupt physical resources. cyber world includes not only the computers and data and information networks, but also the complete and Cyberspace includes: comprehensive system of human existence in those Physical infrastructures and networks. This interpretation of the concept of cyber telecommunications devices that allow for the world allows pondering the essential issues and connection of technological and phenomena that emerge from this novel domain. These communication system networks, understood issues include human social behaviour supported by in the broadest sense (SCADA devices, smart information technical solutions (Tuija, K. & Rauno, K. phones/tablets, computers, servers, etc.); 2015). The Oxford English Dictionary defines Computer systems and the related software “cyber space” as the space of virtual reality; the that guarantee the domain's basic operational notional environment within which electronic functioning and connectivity; communication (esp. via the Internet) occurs (The Oxford English Dictionary. 2009 Edition). According to Networks between computer systems; the UK Cyber Security Strategy, 2011, cyberspace is an interactive domain made up of digital networks that is Networks of networks that connect computer used to store, modify and communicate information. It systems (the distinction between networks and includes the internet, but also the other information networks of networks is mainly systems that support our businesses, infrastructure and organizational); services. In US context, cyberspace is defined as the interdependent network of information technology The access nodes of users and intermediaries infrastructures, and includes the Internet, routing nodes; telecommunications networks, computer systems, and embedded processors and controllers in critical Constituent data (or resident data). industries. Common usage of the term also refers to the virtual environment of information and interactions Often, in common parlance, networks of between people (NSPD. 2008). networks are called Internet (with a lowercase ‘i’), while networks between computers are called intranet. In New Zealand literature, cyber space denotes Internet (with a capital ‘I’, in journalistic language the global network of interdependent information sometimes called the Net) can be considered a part of technology infrastructures, telecommunications the system a). A distinctive and constitutive feature of networks and
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages21 Page
-
File Size-