SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Cyber space
Submitted by :- Adithiya Pillai
Submitted to :- Dinesh Kamble
Content…
 Definition of cyber space
 Origin of cyber space
 Threat to cyber space
 Solution for threats
 Advantages of cyber space
 Disadvantages of cyber space
Definition of cyber space
 Cyber space refer to the virtual computer world, and more specially is an
electronic medium used to form a global computer to facilitate online
communication.
 It is large computer network made up by many worldwide computer networks
that employ TCP IP protocol to aid in communication and data exchange
activities.
 In effect , cyber space can be thought of as the interconnection of human
begins through computers and telecommunication, without regard of physical
geography.
Origin of cyber space
 The tern cyber space fist appeared in the visual art in the late 1960s,
when Danish artist Susanne Ussing (1940-1998)and her partner
architect Carsten Hoff constituted themselves as a atelier cyberspace.
Atelier cyberspace worked at a time when the internet did not exist
and computers were more or less off-limit to artists and creative
engagement.
Threats In cyber space
 Cyber crime
 Hacking
 Cyber terrorism
 Cyber espionage
1.Cyber crime
cybercrime is defined as a crime in which a computer is the
object of the crime or is used as a tool to commit an
offense.
Examples – hacking , phishing, spamming , hate crimes etc
2.Hacking
Hacking is the act of breaking into a computer system for a
politically or socially motivated purpose. The individual who
perform an act of hacking is said to be hacker. It can also be
said as unauthorized excess over a system.
3. Cyber terrorism
Cyber terrorism is the use of internet based attacks in
terrorist activities , including acts of deliberate , large scale
disruption of computer networks especially of personal
computers attached to the internet by the means of tools
such as computer.
4. cyber espionage
Unauthorized spying by computer. The term generally refer
to the development of viruses that clandestinely observe or
destroy data in the computer system of government agencies
and large enterprises
Solution for threats
 Use different user idpassword combination for different accounts and
avoid writing them down.
 make the password more complicated by combining letters ,
numbers, special characters( minimum 10 characters in total) an
change them on regular basis.
 Firewalls are the first line of cyber defense ; they block connections
to unknown or bogus sites and will keep out some types of viruses and
hackers.
 Prevent viruses from infecting our computer by installing and regularly
updating anti-virus software.
Advantage of cyber space
 Unlimited communication
 Abundant information and resources
 Easy sharing
 Online services and e-commerce
1.Unlimited communication
The internet has made it easy for people to communicate with other
because it is cheap and convenient. As such people are able to share
their thought and views on matters affecting the globe. The internet acts
as common global platform where people explore ideologies and
cultures without limitation.
2. Abundant information and resources
the internet is swamped with information about anything and everything.
There are multiple searches engines that have made it easier for internet
users to find information. For example it is now common for people to
look for free advice from the internet on all sorts of issues
3.Easy sharing
Internet sharing information is fast and seamless. We can use
social media sites such as Facebook or an IM app for sharing
information , they will all get the news at the same time. We can
also share music, videos, and any other files.
4.Online services and E-commerce
Today it is possible to carry out financial transactions online. We
can transfer funds, pay taxes and utility bills or book movie tickets
over the internet in the comfort of our office or the home.
Disadvantages of cyber space
 Software vulnerabilities
 Data vulnerabilities
 Interruption of privacy
 Remote access
 Crosses all geographical boundaries
 Assists crime
Cyber Space

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs crackingNaren Naren
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 

Was ist angesagt? (20)

Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 

Ähnlich wie Cyber Space

Ähnlich wie Cyber Space (20)

internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Role Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF MediaRole Of Media In Communication And Types OF Media
Role Of Media In Communication And Types OF Media
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
Essay Topic Internet
Essay Topic InternetEssay Topic Internet
Essay Topic Internet
 
internetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptxinternetppt-140623104336-phpapp02.pptx
internetppt-140623104336-phpapp02.pptx
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Internet
InternetInternet
Internet
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Internet ppt
Internet pptInternet ppt
Internet ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Essays On The Internet
Essays On The InternetEssays On The Internet
Essays On The Internet
 
What-is-Internet, all information about internet
What-is-Internet, all information about internetWhat-is-Internet, all information about internet
What-is-Internet, all information about internet
 
Essay Of Internet
Essay Of InternetEssay Of Internet
Essay Of Internet
 

Mehr von DINESH KAMBLE

Mehr von DINESH KAMBLE (11)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Kürzlich hochgeladen

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Kürzlich hochgeladen (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Cyber Space

  • 1. Cyber space Submitted by :- Adithiya Pillai Submitted to :- Dinesh Kamble
  • 2. Content…  Definition of cyber space  Origin of cyber space  Threat to cyber space  Solution for threats  Advantages of cyber space  Disadvantages of cyber space
  • 3. Definition of cyber space  Cyber space refer to the virtual computer world, and more specially is an electronic medium used to form a global computer to facilitate online communication.  It is large computer network made up by many worldwide computer networks that employ TCP IP protocol to aid in communication and data exchange activities.  In effect , cyber space can be thought of as the interconnection of human begins through computers and telecommunication, without regard of physical geography.
  • 4. Origin of cyber space  The tern cyber space fist appeared in the visual art in the late 1960s, when Danish artist Susanne Ussing (1940-1998)and her partner architect Carsten Hoff constituted themselves as a atelier cyberspace. Atelier cyberspace worked at a time when the internet did not exist and computers were more or less off-limit to artists and creative engagement.
  • 5. Threats In cyber space  Cyber crime  Hacking  Cyber terrorism  Cyber espionage
  • 6. 1.Cyber crime cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Examples – hacking , phishing, spamming , hate crimes etc 2.Hacking Hacking is the act of breaking into a computer system for a politically or socially motivated purpose. The individual who perform an act of hacking is said to be hacker. It can also be said as unauthorized excess over a system.
  • 7. 3. Cyber terrorism Cyber terrorism is the use of internet based attacks in terrorist activities , including acts of deliberate , large scale disruption of computer networks especially of personal computers attached to the internet by the means of tools such as computer. 4. cyber espionage Unauthorized spying by computer. The term generally refer to the development of viruses that clandestinely observe or destroy data in the computer system of government agencies and large enterprises
  • 8. Solution for threats  Use different user idpassword combination for different accounts and avoid writing them down.  make the password more complicated by combining letters , numbers, special characters( minimum 10 characters in total) an change them on regular basis.  Firewalls are the first line of cyber defense ; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers.  Prevent viruses from infecting our computer by installing and regularly updating anti-virus software.
  • 9. Advantage of cyber space  Unlimited communication  Abundant information and resources  Easy sharing  Online services and e-commerce
  • 10. 1.Unlimited communication The internet has made it easy for people to communicate with other because it is cheap and convenient. As such people are able to share their thought and views on matters affecting the globe. The internet acts as common global platform where people explore ideologies and cultures without limitation. 2. Abundant information and resources the internet is swamped with information about anything and everything. There are multiple searches engines that have made it easier for internet users to find information. For example it is now common for people to look for free advice from the internet on all sorts of issues
  • 11. 3.Easy sharing Internet sharing information is fast and seamless. We can use social media sites such as Facebook or an IM app for sharing information , they will all get the news at the same time. We can also share music, videos, and any other files. 4.Online services and E-commerce Today it is possible to carry out financial transactions online. We can transfer funds, pay taxes and utility bills or book movie tickets over the internet in the comfort of our office or the home.
  • 12. Disadvantages of cyber space  Software vulnerabilities  Data vulnerabilities  Interruption of privacy  Remote access  Crosses all geographical boundaries  Assists crime