The internet has upended the way citizens, governments, and businesses interact.

What are Cyberspace and Cybersecurity?

Explore the origins and future challenges of cyberspace.

Video video 7:16

The Internet by the Numbers

As internet access increases, digital divides remain.

Infographic infographic

How Does Cyberspace Work?

See how information is transferred across the internet.

Infographic infographic

The Origins of the Internet

Learn how the internet evolved to the platform we use today.

Timeline timeline

Should the Internet Respect National Borders?

Learn more about the debate over a free and open internet.

Video video 2:58

Social Media: Revolutionizing Communication

Social media has connected people at lightning speeds and upended long-held monopolies on information. But like past innovations, it has also created major societal challenges.

Photo photo

How Companies and Governments Do (and Don’t) Protect Your Data

See how insufficient privacy laws leave your personal data vulnerable online.

Infographic infographic

What Is Cryptocurrency?

Explore the uses and abuses of digital currency in society.

Interactive interactive

The Growing Threat of Cyberattacks

Countries are racing to build dangerous new cyberweapons.

Video video 4:24

Cyberspace and Cybersecurity Module Assessment

Questions to check your understanding.

Interactive interactive

Cyberspace and Cybersecurity Reading List

Supplemental readings and other resources.

Summary summary

How Cyberspace and Cybersecurity Affect You

Explore how cybersecurity breaches can affect your daily life.

More From CFR

    Transforming Election Cybersecurity

    The events of the 2016 U.S. election demonstrate that more high-level political action is required to manage real and perceived cyber vulnerabilities in election systems.

    Photo: Brendan McDermid/Reuters

    Getting the International Development Community to Care About Cybersecurity

    International assistance programs rely on digital technologies to deliver food, housing, education, and a host of other services to the developing world. However, few donors or recipients incorporate cybersecurity into their activities. That’s a problem.

    Photo: Cathal McNaughton/Reuters

    Cyber Operations Tracker

    A database of publicly known state-sponsored cyber incidents since 2005.

    Photo: Kevin Lamarque/Reuters