What is cyberspace definition?
It is the virtual and dynamic space created by
the machine clones. According to the cyberspace
definition, it is a web consisting of consumer
computers, electronics and communication
networks by which the consumer is connected to
the world.
Cyberspace VS Physical world
Cyber space              Physical world
Dynamic, exponential     Well – defined, static
and undefined            and incremental
No fixed shape, rather
as vast as human
imagination
Cyber laws
It is important to note that since cyberspace
does not belong to the physical world, the
physical laws do not apply to the cyberspace
crime. A separate set of cyber laws are
formulated by the government.
             E - Commerce      E – Government
Motivation   Make profit       Maximize social
                               utility, create e
                               – participation
             Cost reduction of Cost reduction of
             service delivery service delivery
             Automation of     Automation of
             internal          internal processes
             processes
Objective    Sale of products Optimization of
             and services      service quality to
                               citizens
             Information       Information
             provision         provision
             Online customer   Online services to
             service           citizens
Priority     Safe & secure     Minimize digital
             transactions      divide
Technology   Internet, web     Internet, web
             based platforms, based platforms,
             back office       back office system
             system
Decision     centralized       Dispersion of
making                         authority
authority
Target      Customers,         Any citizen
group       potential
            customers
legislation freedom            Laws and
                               regulation and
                               complexity
Services     Primarily         Primarily
             transactional     informational
What are Actors?
A cyber threat actor is a person or a group in
an action or process that is characterized by
malice or hostile action using computers,
devices, systems or networks.
These groups aim to take advantage of
vulnerabilities, low cyber security awareness or
technological developments to gain unauthorized
access to information system in order to access
or otherwise affect victim’s data, devices,
system, and networks.
What does the cybernetics mean?
A broad field, which encompasses the study
systems which are mechanical, biological,
social, physical, or cognitive in nature.
Cyberspace: worldwide of computer networks that
uses the TCP/IP for communication to facilitate
the transmission of data.
Cyberpunk: mean something like anarchy via
machine or machine/ computer rebel movement.
Cyber warfare: means information warriors
unleashing vicious attacks against an
unsuspecting opponents computer networks,
wreaking havoc and paralyzing nations.
Cyber terrorism: use of disruptive activities or
the threat against computers and/ or networks,
with the intention to cause harm or further
social, ideological, religious, political or
similar objectives or to intimidate any person
in furtherance of such objective.
Distinction between conventional and cyber crime
Convectional crime: social and economic
phenomenon and as old as society. Legal wrong
which can be followed by criminal proceedings
and result in punishments.
Cyber Crime: where computer is subject or object
of crime. Unlawful act where computer is a tool
or target or both.
Threat: exploits a vulnerability and can damage
or destroy an asset.
Vulnerability: refers to a weakness in your
hardware, software or procedures.
Risk: refers to the potential for lost, damage
Reasons for cyber crime
 1.   Capacity to store data in comparatively
      small space – the computer has unique
      characteristics of storing data in a very
      small space. This affords to remove or
      derive information either through physical
      or virtual medium makes it much easier.
 2.   Easy to access – the problem encountered in
      guarding a computer system from
      unauthorized access is that there is every
 3.   Complex –
 4.   Negligence –
 5.   Loss of evidence –