CYBER TERRORISM PRESENTED BY: MEENU SHUKLA Mtech (1 st sem CYB) ERP : 0151CYB019 9/27/2019
CYBER TERRORISM “ Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb ” 9/27/2019
INTRODUCTION ABOUT TOPICS History Features Working Strategy Common attack Forms Examples Countering IMPACT Affect In Future Prevention & Protection Punishment Conclusion References 9/27/2019
INTRODUCTION As the use of Internet is increasing day by day, traditional concepts and methods of terrorism have taken new dimensions . Individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and even the countries. 9/27/2019
History of Cyber Terrorism The term "terrorism" comes from the French word “terrorisme” , which is based on the Latin verb terrere (to cause to tremble ). Public interest in cyber terrorism began in the late 1980s, when the term was coined by Barry C. Collin in 1996 . 9/27/2019
What is Cyber terrorism??? A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber-terrorists spread computer viruses , and others threaten people electronically . 9/27/2019
Categorized By: 9/27/2019
9/27/2019 Crimes Which Comes Under Cyber Terrorism
Brief Definitions( Contd …) Extortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack. Ex: Nokia (FINNLAND) What happened : A news broke in 2007 about a blackmail case that had Nokia pay millions of euros in extortion money. The Finnish phone manufacturer was being held hostage by a hacker who managed to steal an encryption key used in its prevalent Symbian operating system. The attacker threatened to make the key public if Nokia didn't meet payment demands, putting Symbian at risk of other criminals using the key to upload legitimate-looking but malicious apps to phones worldwide . Vandalism includes the addition, removal, or other modification of the text that is either humorous, nonsensical, or that is of an offensive, humiliating, or otherwise degrading nature of that project. Ex: Wikipedia Cyber Hate refers to any use of electronic communications technology to spread racist, extremist or terrorist messages or information. These electronic communications technologies include the Internet (i.e., Web-sites, social networking sites, dating sites, blogs, online games and E-mail. 9/27/2019
Features of Cyber Terrorism Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks. Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously. Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorter Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available. Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack. 9/27/2019
Working Strategy of Cyber terrorism.. Hacking into computer systems. Introducing viruses to vulnerable networks. Website Defacing. Denial-of-Service( DoS ) attacks. Terroristic threats made via e-mail. 9/27/2019
How does Cyber Terrorism work? Eavesdropping: Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a malicious person. Indirect attacks: Attacks which is launched by a third party computer which has been taken over remotely . Backdoors : A backdoor is a potential security risk . A ttackers often use back doors that they detect or install themselves, as part of an exploit. 9/27/2019
TOOLS FOR CYBER TERRORISM 9/27/2019
Interesting, right? This is just a sneak preview of the full presentation. We hope you like it! To see the rest of it, just click here to view it in full on PowerShow.com . Then, if you’d like, you can also log in to PowerShow.com to download the entire presentation for free.