Home > Topics > Cyber Security Laws > Components of Cyber Space – Networks, Systems & Data

Components of Cyber Space – Networks, Systems & Data

Cyber space may seem invisible, but it's built on real components - physical cables, software systems, and billions of data points. Let's break down the architecture!


Three-Layer Architecture

Loading diagram…

Think of it like a building:

  • Physical Layer = Foundation, walls, electrical wiring
  • Logical Layer = Elevators, plumbing systems, HVAC
  • Social Layer = People living in the building, their activities

Layer 1: Physical Infrastructure

A. Network Hardware

1. Undersea Cables 🌊

  • 99% of international data travels through undersea fiber optic cables!
  • 500+ cables spanning 1.4 million km globally
  • Each cable carries 200 Tbps (Terabits per second)

Example: When you WhatsApp someone in USA from India, your message travels through SEA-ME-WE 5 cable (Singapore-Europe-Middle East-Western India)

2. Data Centers 🏢

  • Massive warehouses filled with servers
  • India has 130+ data centers
  • Google, Amazon, Microsoft data centers in Mumbai, Hyderabad
  • Each consumes electricity equivalent to 10,000 homes!

3. Routers & Switches

  • Direct data packets to correct destination
  • Core routers handle millions of packets per second

4. Satellites 🛰️

  • For remote areas without cables
  • Starlink (Elon Musk): 5,000+ satellites for global internet
  • Used for GPS, weather, communication

5. Your Devices

  • Smartphones: 750 million in India
  • Computers: 200 million
  • IoT Devices: Smart TVs, Alexa, security cameras (500 million+ in India)

Layer 2: Logical Infrastructure (Software)

A. Protocols (Rules of Communication)

1. TCP/IP (Transmission Control Protocol / Internet Protocol)

  • Foundation of internet
  • Breaks data into packets, sends them, reassembles at destination
  • Like postal system: Sender address, receiver address, contents

2. HTTP/HTTPS (HyperText Transfer Protocol)

  • How web browsers communicate with websites
  • HTTPS = Secure version (encrypted)
  • Look for padlock 🔒 in browser address bar

3. SMTP (Simple Mail Transfer Protocol)

  • For sending emails

4. FTP (File Transfer Protocol)

  • For uploading/downloading files

B. Operating Systems

  • Windows: 70% of desktops
  • Android: 95% of Indian smartphones
  • iOS: Apple iPhones
  • Linux: Servers, tech-savvy users

C. Applications & Software

Categories:

  1. Web Browsers: Chrome, Safari, Edge, Firefox
  2. Messaging Apps: WhatsApp, Telegram, Signal
  3. E-commerce: Amazon, Flipkart apps
  4. Banking: PhonePe, Google Pay, Paytm, bank apps
  5. Entertainment: Netflix, YouTube, Spotify
  6. Productivity: MS Office, Google Workspace, Zoom

D. Databases

  • Store massive amounts of structured data
  • Examples:
    • Aadhaar database: 1.3 billion records
    • Google's database: Petabytes (1 million GB) of search data
    • Facebook: 2+ billion user profiles

Layer 3: Social Layer (Users & Data)

A. Users

Global:

  • 5.3 billion internet users
  • 4.9 billion mobile internet users

India:

  • 850 million internet users
  • 700 million social media users
  • 12 billion UPI transactions/month

B. Content & Data

Types of Data in Cyber Space:

Loading diagram…

Data Volume:

  • 2.5 quintillion bytes of data created daily globally!
  • 90% of world's data was created in last 2 years
  • YouTube: 500 hours of video uploaded every minute
  • WhatsApp: 100 billion messages daily

C. Digital Identities

Everyone online has multiple identities:

PlatformYour Identity
Emailrajgopal@gmail.com
Social Media@raj_gopal (username)
BankingAccount number, UPI ID
Aadhaar12-digit unique ID
IP Address192.168.1.1 (location identifier)
Problem: Identity Theft

Cybercriminals steal these identities to commit fraud, access bank accounts, or impersonate victims!


How These Layers Work Together

Example: Sending a WhatsApp Message

Step 1 (Physical):

  • You type message on smartphone
  • Smartphone connects to cell tower via radio waves
  • Cell tower connects to internet via fiber cables

Step 2 (Logical):

  • WhatsApp app uses TCP/IP protocol
  • Message encrypted (HTTPS)
  • Broken into data packets
  • Packets travel through routers

Step 3 (Social):

  • Message reaches recipient's phone
  • Stored on WhatsApp servers (data)
  • Recipient sees notification, reads message

Total Time: Less than 1 second, even if recipient is 10,000 km away!


Critical Infrastructure

Some components are so important, their disruption causes massive damage:

1. Domain Name System (DNS)

  • Phone book of internet
  • Converts website names (google.com) to IP addresses (142.250.193.78)
  • If DNS fails, entire internet becomes unusable!

2021 Facebook Outage:

  • DNS servers misconfigured
  • Facebook, Instagram, WhatsApp down for 6 hours
  • $60 million loss per hour

2. Internet Exchange Points (IXP)

  • Where different networks connect and exchange traffic
  • India has 12 IXPs (Mumbai, Delhi, Chennai, Kolkata, etc.)
  • Attack on IXP = Regional internet blackout

3. Cloud Storage

  • AWS (Amazon): 30% of internet runs on it
  • Google Cloud, Microsoft Azure
  • Store websites, apps, databases

2017 AWS Outage:

  • 4-hour outage in Virginia data center
  • Half of internet affected (Netflix, Airbnb, Slack down)

Security Concerns in Each Layer

Physical Layer Threats

  • Cable Cuts: Sharks bite undersea cables! (Yes, really)
  • Data Center Attacks: Bombings, fires
  • Device Theft: Stolen laptops, phones with data

Logical Layer Threats

  • Malware: Viruses, ransomware, spyware
  • Software Vulnerabilities: Bugs, zero-day exploits
  • Protocol Attacks: DDoS, DNS poisoning

Social Layer Threats

  • Phishing: Fake emails/websites stealing passwords
  • Data Breaches: Hackers leak user databases
  • Social Engineering: Tricking users into revealing information

Data: The Crown Jewel

"Data is the new oil" - Clive Humby

Why Data is Valuable

1. Personalization:

  • Netflix recommends shows based on your watch history
  • Amazon suggests products you might buy

2. Targeted Advertising:

  • Facebook shows ads based on your interests
  • Google Ads based on search history
  • Digital advertising market: ₹2 lakh crore in India

3. AI & Machine Learning:

  • Needs huge data to train models
  • Google Translate, ChatGPT, self-driving cars - all data-driven

4. Business Intelligence:

  • Companies analyze data to make decisions
  • Predict trends, optimize supply chains

Data Monetization

How Tech Giants Make Money:

  • Google: Free services (Search, Gmail, Maps) → Collects your data → Sells targeted ads
  • Facebook: Free platform → Your data → ₹7 lakh crore revenue/year
  • You are not the customer, you are the product!
Privacy Concern

Do you really "own" your data? Or do tech companies own it once you upload photos, posts, emails?


Internet of Things (IoT)

IoT = Everyday objects connected to internet

Examples in India:

  • Smart TVs: 50 million households
  • Smart speakers: Alexa, Google Home (20 million)
  • Smart doorbells, security cameras
  • Smart watches, fitness bands *Wearables: 100 million users
  • Connected cars: GPS, diagnostics

Problem: Each IoT device = potential entry point for hackers!

2016 Mirai Botnet Attack:

  • Hackers infected 600,000 IoT devices (cameras, routers)
  • Used them to launch massive DDoS attack
  • Took down Twitter, Netflix, Reddit

Summary

  • Cyber space has 3 layers: Physical (hardware), Logical (software), Social (users/data)
  • Physical: Undersea cables (99% traffic), data centers, satellites, devices
  • Logical: Protocols (TCP/IP, HTTPS), OS (Windows, Android), Apps, Databases
  • Social: 5.3 billion users, quintillions of bytes of data, digital identities
  • Critical infrastructure: DNS, IXPs, cloud storage - disruption causes major outages
  • Data is the most valuable asset - drives advertising, AI, business decisions
  • Security threats exist at all three layers

Quiz Time! 🎯

Loading quiz…


Next Chapter: Categories of Cyber Space – Public, Private & Government! 🏛️