Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. ...
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.
Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed].
There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.
Size: 2.96 MB
Language: en
Added: Oct 18, 2014
Slides: 27 pages
Slide Content
CYBER TERRORISM By S. Sai Praveen Seva 12761A0551
OVERVIEW Terms Cyber-terrorists Why cyber-terrorism Forms of cyber-terrorism Impact Effects Examples Conclusion
TERMS Cyber terrorism – The use of the Net for terrorism. Cyber crime – The use of the Net for criminal actions. Cyber Attacks – Email bombs, viruses, intentional actions. Information Warfare – Formalized governmental warfare Techno Terrorism – Use of technology by terrorist groups
CYBER-TERRORISTS An individual that uses computer\network technology (i.e., networks, computers, Internet) to 6-9-cause intense fear; one who uses computer\network technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.
Why do they use cyber attacks ?
Cyber terrorist prefer using the cyber attack methods because of many advantages for it
It is cheaper than traditional methods
The action is very difficult to be tracked
They can hide their personalities and location
There are no physical barries or check to cross
Big targets can be attacked The tremendous , nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets
Forms of CYBER-TERRORISM 1.Privacy Violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. Man has become sensitive to publicity.
Information technology misuses the data of private individuals A computer network owned by the Government may contain valuable information concerning defence and other top secrets. 2.Secret information appropriation and data theft :
3.Distributed denial of Service Attack The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them.
This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier . 4.Network Damage and Disruption:
What would the Impact be? The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems or used in support of a physical attack to cause further confusion and possible delays in proper response 1.Direct Cost Implications. 2.Indirect Cost Implications.
Terrorists Groups
Sample Nuclear Launch While Under Cyber Attack
Effects Cyber terrorism can have a serious large-scale influence on significant number of people. It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.
Cyberspace The New Realm of Warfare
Examples Terrorists in Romania gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved . The official web site of the Presidential Palace of Afghanistan was affected by a DOS attack that rendered it inaccessible.
The internet has provided a virtual war for countries having problems with other such . * As taiwan against China. * Israel against Palestine . *India against pakistan , China
What does a terrorist group achieve with a cyber attack that they can’t with a conventional attack?
Attacks are doubling each year
How can we protect ourselves? All accounts should have passwords and the passwords should be unusual, difficult to guess Change the network configuration when defects become visible Audit systems and check logs to help in detecting and tracing an intruder If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it
CONCLUSION After a close look at some of the facts, I have come to the these conclusions. Some of my conclusions point to the fact that Cyberterrorism could be an actually threat. But the other part is that there is too much media hype created around the possiblity of a Cyberterrorism .