Cyber Terrorism

10,140 views 27 slides Oct 18, 2014
Slide 1
Slide 1 of 27
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27

About This Presentation

Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Cyberterrorism is a controversial term. ...


Slide Content

CYBER TERRORISM By S. Sai Praveen Seva 12761A0551

OVERVIEW Terms Cyber-terrorists Why cyber-terrorism Forms of cyber-terrorism Impact Effects Examples Conclusion

TERMS Cyber terrorism – The use of the Net for terrorism. Cyber crime – The use of the Net for criminal actions. Cyber Attacks – Email bombs, viruses, intentional actions. Information Warfare – Formalized governmental warfare Techno Terrorism – Use of technology by terrorist groups

CYBER-TERRORISTS An individual that uses computer\network technology (i.e., networks, computers, Internet) to 6-9-cause intense fear; one who uses computer\network technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.

Why do they use cyber attacks ?

Cyber terrorist prefer using the cyber attack methods because of many advantages for it

It is cheaper than traditional methods

The action is very difficult to be tracked

They can hide their personalities and location

There are no physical barries or check to cross

Big targets can be attacked The tremendous , nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets

Forms of CYBER-TERRORISM 1.Privacy Violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. Man has become sensitive to publicity.

Information technology misuses the data of private individuals A computer network owned by the Government may contain valuable information concerning defence and other top secrets. 2.Secret information appropriation and data theft :

3.Distributed denial of Service Attack The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them.

This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier . 4.Network Damage and Disruption:

What would the Impact be? The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems or used in support of a physical attack to cause further confusion and possible delays in proper response 1.Direct Cost Implications. 2.Indirect Cost Implications.

Terrorists Groups

Sample Nuclear Launch While Under Cyber Attack

Effects Cyber terrorism can have a serious large-scale influence on significant number of people. It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.

Cyberspace The New Realm of Warfare

Examples Terrorists in Romania gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved . The official web site of the Presidential Palace of Afghanistan was affected by a DOS attack that rendered it inaccessible.

The internet has provided a virtual war for countries having problems with other such . * As taiwan against China. * Israel against Palestine . *India against pakistan , China

What does a terrorist group achieve with a cyber attack that they can’t with a conventional attack?

Attacks are doubling each year

How can we protect ourselves? All accounts should have passwords and the passwords should be unusual, difficult to guess Change the network configuration when defects become visible Audit systems and check logs to help in detecting and tracing an intruder If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it

CONCLUSION After a close look at some of the facts, I have come to the these conclusions. Some of my conclusions point to the fact that Cyberterrorism could be an actually threat. But the other part is that there is too much media hype created around the possiblity of a Cyberterrorism .