1 / 21

CYBER TERRORISM

Submitted by: Abhashree Pradhan 0501227096 8CA (1). CYBER TERRORISM. CONTENTS. Introduction New risks and threats Cause of cyber attack Vulenarability types Methods of cyber terrorism Examples Steps for prevention Conclusion. INTRODUCTION.

elsa
Download Presentation

CYBER TERRORISM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Submitted by: AbhashreePradhan 0501227096 8CA (1) CYBER TERRORISM

  2. CONTENTS • Introduction • New risks and threats • Cause of cyber attack • Vulenarabilitytypes • Methods of cyber terrorism • Examples • Steps for prevention • Conclusion

  3. INTRODUCTION Cyberterrorism is a criminal act Perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.

  4. New Risks and Threats • Globalization of infrastructures increases level of vulnerability • Easy access to infrastructures via Internet and Public Switched Telecommunications Network • Interdependencies of systems make attack consequences harder to predict and perhaps more severe due to the cascading effects • Malicious tools and recipes for new cyber weapons are widely available and do not require a high degree of technical skill to use

  5. WHY CYBER ATTACK S? • It is Cheaper than traditional methods. • They can hide their personalities and location. • They can use this method to attack a big number of targets. • They can use this method to attack a big number of targets. • The action is very Difficult to be tracked.

  6. Vulnerability Types .Computer based • Poor passwords .Facility based • Servers in unprotected areas • Inadequate physical security measures Lack of appropriate firewall protection

  7. TERRORIST GROUPS

  8. METHODS OF CYBER TERRORISM • Some of weapons: • Radio frequency weapons/High powered microwave • Transient electrmagnetic device • Viruses,Logicbombs,Trojan horse • Denial of services

  9. RF WEAPONS • Fries the electrical component of target • Consists of power source, apparatus to generate RF , antenna • RF energy entered through frontend/backend • Expensive , complex, require more power, large in size

  10. TRANSIENT ELECTROMAGNETIC DEVICE • Emits a large” spike “burst of energy • Spike targets large spectrum of space • Smaller, cheaper, technically supported

  11. ELECTRO MAGNETIC BOMBS • Creats electromagnetic pulse • It creats current between 10 to 1000 times greater than a lightening strike

  12. Logic bombs: It is a program that may be maliciously modified to fail when certain conditions are met. • Trojan horse: A program that overtly does one thing while covertly doing another. • Virus: A specific type of Trojan horse that can be used to spread its “infection” from one computer to another.

  13. HACKTISM Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.

  14. Cyber Facilitated Terrorism Cyber Facilitated Terrorism is terrorism using cyber means as a tool for accomplishing the act. Example: A terrorist sends an email message to a Senator stating that 50 anonymous letters have been sent to the office, each containing large amounts of anthrax.

  15. EXAMPLES OF CYBER TERRORISM • Terrorists created an active x control for internet that can trick quicken accounting program into removing money from user’s account • Created viruses and trojan horses to make networks useless • Hacking the hospital computers • Spreading different rumor through internet • Threaten large banks

  16. PREVENTION OF CYBER TERRORISM Cources offered free of charges to technical perssonel from public safety, law enforcement ,health care providers Implement network design Improve modern technology Analyze modern and emerging attack methodology Operate various software tools /services commonly used by attackers to surveil

  17. STEPS TAKEN FOR PREVENTION • Back up critical informatipon • Authenticate network users • Create mechanism for reporting problems in workplace • Reduce system vulnerability in attack situation

  18. FUTURE OF CYBER TERRORISM In the future, cyberterrorism may become a viable option to traditional physical acts of violence due to: • Anonymity • Diverse targets • Low risk of detection • Low risk of personnel injury • Low investment • Operate from nearly any location • Few resources are neede

  19. CONCLUSION • Cyber terrorism can be reduced by creating the awareness programmes between people and developing security system of computers

  20. REFFERENCES • WWW.Google.com • www.wikipedia.com

  21. THANK YOU

More Related