12
CRACKING DOWN ON INTERNATIONAL CYBERTERRORISM PRESENT ATION BY SUN N Y PA TEL, DARI A POT APOV A, RYAN RICHARDS

Cracking down on international cyberterrorism

  • Upload
    shilah

  • View
    38

  • Download
    0

Embed Size (px)

DESCRIPTION

Cracking down on international cyberterrorism. presentation BY SUNNY PATEL, DARIA POTAPOVA, RYAN RICHARDS. WHY CYBERTERRORISM IS IMPORTANT?. Cyber terrorism – the use of computing resources to imitate or coerce others. Hacking is the leading cause of data breaches; - PowerPoint PPT Presentation

Citation preview

Page 1: Cracking down on international  cyberterrorism

CRACKING DOWN ON

INTERNATIONAL

CYBERTE

RRORISM

P R E S E N T A T I ON B

Y SU N N Y P

A T E L , DA R I A

P O T A P O V A , RY A N R

I CH A R D S

Page 2: Cracking down on international  cyberterrorism

WHY CYBERTERRORISM IS IMPORTANT?Cyber terrorism – the use of computing resources

to imitate or coerce others. Hacking is the leading cause of data breaches; Hacking groups are typically loosely affiliated

and rapidly expanding (which makes them very dangerous). They may include members from around the world and the number of members can range from tens to thousands;

Hacked data is irrelevant, biased and unreliable for auditors and accountants, which can potentially cost thousands to the companies.

Page 3: Cracking down on international  cyberterrorism

WHY GOVERNMENT’S ROLE IN CRACKING DOWN CYBER TERRORISM IS IMPORTANTNumber of attacks by hackers is increasing –

companies need to have effective systems of internal controls in place to prevent, detect and correct the attacks.

Companies need help in fighting those attacks.Governments need to take responsibility and

crack down on these cyber terrors.

Page 4: Cracking down on international  cyberterrorism

ANONYMOUS• Emerged in 2003 on the imageboard 4chan

online chat• Has no leaders, no hierarchical structure, and

no geographical epicenter

Page 5: Cracking down on international  cyberterrorism

ANONYMOUS• Many members are motivated by freedom of

information;• Famous for coordinating a range of

disconnected actions from trolling to political protests;

• Technically, the group is open to all and has no boundaries to participation;

Page 6: Cracking down on international  cyberterrorism

LULZSEC• Small in size, but performed significant

damages;• Main reason for attacks is for lulz• Helped raise the public awareness about

hackers• Lulzsec did not participate in selling hacked

information

Page 7: Cracking down on international  cyberterrorism

RED HACKER ALLIANCE• Largest hacking group in the world;• ‘an independent confederation of patriotic

youth dedicated to defending China against perceived threats to national dignity’

• Was formed in response to the 1998 ethnic riots in Indonesia;

• Many consider affiliation of Chinese government to RHA;

• Since it’s origination RHA has been involved in at least five major cyber conflicts;

Page 8: Cracking down on international  cyberterrorism

RED HACKER ALLIANCEAttacks:• CNN • Against the US Geological survey• NASA• Cornell University• More than 100 other US government and business sites

Page 9: Cracking down on international  cyberterrorism

GOVERNMENT RESPONSES TO HACKERSProperly train government personnel Investment in research and developmentPromote international cooperation among

governments; crucial to fighting cyber terrorism worldwide.

Raise the security levels on critical accounting infrastructures, where the detection and response of an intrusion is immediate.

Page 10: Cracking down on international  cyberterrorism

GOVERNMENTS RESPONSE TO HACKERS (CONT’D)

United States• In 2008, then-President Bush created the

Comprehensive National Cybersecurity Initiative (CNCI)• Establishing a front line defense by creating shared

situational awareness to improve the government’s ability to prevent intrusions

Europe Europol, a European law enforcement agency

February 28, 2012, Europol arrested four individuals in a coordinated operation against hacktivists claiming to be part of the Anonymous collective

Page 11: Cracking down on international  cyberterrorism

GOVERNMENTS RESPONSE TO HACKERS (CONT’D)Canada• Created Canada’s Cyber Security Strategy in 2010

Purpose is to “invest in securing the Government of Canada systems, as well as partnering with other governments and with industry to ensure systems vital to Canadian security are protected.”

China Enacted new laws to fight cyber-terrorism despite

controversies of China’s involvement New law enacted prosecutes the “acquisition of

computer system data or control of computer systems and prohibit supplying programs or tools for the purpose of intrusion into computer systems “

Page 12: Cracking down on international  cyberterrorism

CONCLUSION:Few simple things to protect yourself from cyber-

terrorism:• All company accounts should have passwords

and the passwords should be difficult to unfold;• Network configurations should be changed

when defects become known;• Check with venders for upgrades and patches;• Audit systems and check logs to help in

detecting and tracing an intruder.