Upload
shilah
View
38
Download
0
Embed Size (px)
DESCRIPTION
Cracking down on international cyberterrorism. presentation BY SUNNY PATEL, DARIA POTAPOVA, RYAN RICHARDS. WHY CYBERTERRORISM IS IMPORTANT?. Cyber terrorism – the use of computing resources to imitate or coerce others. Hacking is the leading cause of data breaches; - PowerPoint PPT Presentation
Citation preview
CRACKING DOWN ON
INTERNATIONAL
CYBERTE
RRORISM
P R E S E N T A T I ON B
Y SU N N Y P
A T E L , DA R I A
P O T A P O V A , RY A N R
I CH A R D S
WHY CYBERTERRORISM IS IMPORTANT?Cyber terrorism – the use of computing resources
to imitate or coerce others. Hacking is the leading cause of data breaches; Hacking groups are typically loosely affiliated
and rapidly expanding (which makes them very dangerous). They may include members from around the world and the number of members can range from tens to thousands;
Hacked data is irrelevant, biased and unreliable for auditors and accountants, which can potentially cost thousands to the companies.
WHY GOVERNMENT’S ROLE IN CRACKING DOWN CYBER TERRORISM IS IMPORTANTNumber of attacks by hackers is increasing –
companies need to have effective systems of internal controls in place to prevent, detect and correct the attacks.
Companies need help in fighting those attacks.Governments need to take responsibility and
crack down on these cyber terrors.
ANONYMOUS• Emerged in 2003 on the imageboard 4chan
online chat• Has no leaders, no hierarchical structure, and
no geographical epicenter
ANONYMOUS• Many members are motivated by freedom of
information;• Famous for coordinating a range of
disconnected actions from trolling to political protests;
• Technically, the group is open to all and has no boundaries to participation;
LULZSEC• Small in size, but performed significant
damages;• Main reason for attacks is for lulz• Helped raise the public awareness about
hackers• Lulzsec did not participate in selling hacked
information
RED HACKER ALLIANCE• Largest hacking group in the world;• ‘an independent confederation of patriotic
youth dedicated to defending China against perceived threats to national dignity’
• Was formed in response to the 1998 ethnic riots in Indonesia;
• Many consider affiliation of Chinese government to RHA;
• Since it’s origination RHA has been involved in at least five major cyber conflicts;
RED HACKER ALLIANCEAttacks:• CNN • Against the US Geological survey• NASA• Cornell University• More than 100 other US government and business sites
GOVERNMENT RESPONSES TO HACKERSProperly train government personnel Investment in research and developmentPromote international cooperation among
governments; crucial to fighting cyber terrorism worldwide.
Raise the security levels on critical accounting infrastructures, where the detection and response of an intrusion is immediate.
GOVERNMENTS RESPONSE TO HACKERS (CONT’D)
United States• In 2008, then-President Bush created the
Comprehensive National Cybersecurity Initiative (CNCI)• Establishing a front line defense by creating shared
situational awareness to improve the government’s ability to prevent intrusions
Europe Europol, a European law enforcement agency
February 28, 2012, Europol arrested four individuals in a coordinated operation against hacktivists claiming to be part of the Anonymous collective
GOVERNMENTS RESPONSE TO HACKERS (CONT’D)Canada• Created Canada’s Cyber Security Strategy in 2010
Purpose is to “invest in securing the Government of Canada systems, as well as partnering with other governments and with industry to ensure systems vital to Canadian security are protected.”
China Enacted new laws to fight cyber-terrorism despite
controversies of China’s involvement New law enacted prosecutes the “acquisition of
computer system data or control of computer systems and prohibit supplying programs or tools for the purpose of intrusion into computer systems “
CONCLUSION:Few simple things to protect yourself from cyber-
terrorism:• All company accounts should have passwords
and the passwords should be difficult to unfold;• Network configurations should be changed
when defects become known;• Check with venders for upgrades and patches;• Audit systems and check logs to help in
detecting and tracing an intruder.