A Review on Digital Sphere Threats and Vulnerabilities

A Review on Digital Sphere Threats and Vulnerabilities

Muthuramalingam S. (Thiagarajar College of Engineering, India), Thangavel M. (Thiagarajar College of Engineering, India) and Sridhar S. (Thiagarajar College of Engineering, India)
DOI: 10.4018/978-1-5225-0193-0.ch001
OnDemand PDF Download:
No Current Special Offers


Digital Sphere is a global network which consists of all the resources that are required for the users, who connected with the digital network. It connects the entire world through the digital technologies. The digital network includes services, applications, and web page files. By connecting, to this network, people from one end in the world can able to communicate and share their knowledge across the world. Global communication and sharing may allow an unknown person which can disrupt the services. This chapter proposes a review on the threats and vulnerabilities related to the digital sphere network with value added security guidelines and countermeasures given to overcome such issues.
Chapter Preview

2. Background

The security in the cyber space needs to attain a desired state, in-order to grant secure access to the users who are able to travel along the cyber world without having worry about security breaches. The word cyber is originated from the Greek word kybereo it specifies- to steer, to guide, to control. At the end of the 1940’s, Norbert wiener an American mathematician, began to use the word cybernetics to describe computerized control systems. According to the wiener’s statement cybernetics deals with sciences that address the control of machines and living organisms through their communications and from the given feedback.

Major challenge drivers in the cyber world are time, data and network. In today's world, (i) for a single minute, 2,16,000 photos are shared through instagram, (ii) Upload rate of video into the YouTube site increased in every 3 days (iii) Within a minute 70 new domains are registered and created 572 new websites (iv) At the same time face book, twitter, emails are also posing their increased rate in the internet (Gao, 2011). That is face book receives 1.8 million likes, 1, 80,000 more tweets taken by twitter and 204 million emails are sent and received by Gmail. and (v) Chatting over Skype are taken by the relatives and friends are taken is equivalent to 1.4 million minutes. Compared to the previous year's Internet usage is drastically increased (Woollaston 2013).

According to the U.S News Briefs, unauthorized access to the network becomes a major issue than denial of service attacks. With the increased device usage and growth of cyber space, most of the people needs to access all the services through unauthorized privileges. The FBI investigating that the criminals having target to the selected regional offices computer systems including intrusions into public switched networks, major network intrusions, privacy violations and other crimes (IT Professional 2005).

Complete Chapter List

Search this Book: