Upload
ranjitjitu
View
371
Download
3
Tags:
Embed Size (px)
Citation preview
CYBER TERRORISM
Submitted by:Abhashree Pradhan05012270968CA (1)
CONTENTS
Introduction New risks and threats Cause of cyber attack Vulenarability types Methods of cyber terrorism Examples Steps for prevention Conclusion
INTRODUCTION
Cyberterrorism is a criminal act Perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.
New Risks and Threats
Globalization of infrastructures increases level of vulnerability
Easy access to infrastructures via Internet and Public Switched Telecommunications Network
Interdependencies of systems make attack consequences harder to predict and perhaps more severe due to the cascading effects
Malicious tools and recipes for new cyber weapons are widely available and do not require a high degree of technical skill to use
WHY CYBER ATTACK S?
It is Cheaper than traditional methods.
They can hide their personalities and location.
They can use this method to attack a big number of targets.
They can use this method to attack a big number of targets.
The action is very Difficult to be tracked.
Vulnerability Types
.Computer based Poor passwords
.Facility based Servers in unprotected areas Inadequate physical security measures
Lack of appropriate firewall protection
TERRORIST GROUPS
METHODS OF CYBER TERRORISM
Some of weapons: Radio frequency weapons/High
powered microwave Transient electrmagnetic device Viruses,Logic bombs,Trojan horse Denial of services
RF WEAPONS
Fries the electrical component of target
Consists of power source, apparatus to generate RF , antenna
RF energy entered through frontend/backend
Expensive , complex, require more power, large in size
TRANSIENT ELECTROMAGNETIC DEVICE
Emits a large” spike “burst of energy Spike targets large spectrum of
space Smaller, cheaper, technically
supported
ELECTRO MAGNETIC BOMBS
Creats electromagnetic pulse It creats current between 10 to 1000
times greater than a lightening strike
Logic bombs: It is a program that may be maliciously modified to fail when certain conditions are met.
Trojan horse: A program that overtly does one thing while covertly doing another.
Virus: A specific type of Trojan horse that can be used to spread its “infection” from one computer to another.
HACKTISM
Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue.
Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.
Cyber Facilitated Terrorism Cyber Facilitated Terrorism is terrorism using cyber means as a tool for accomplishing the act.
Example: A terrorist sends an email message to a Senator stating that 50 anonymous letters have been sent to the office, each containing large amounts of anthrax.
EXAMPLES OF CYBER TERRORISM
Terrorists created an active x control for internet that can trick quicken accounting program into removing money from user’s account
Created viruses and trojan horses to make networks useless
Hacking the hospital computers Spreading different rumor through
internet Threaten large banks
PREVENTION OF CYBER TERRORISM
Cources offered free of charges to technical perssonel from public safety, law enforcement ,health care providers
Implement network designImprove modern technologyAnalyze modern and emerging attack
methodologyOperate various software tools /services
commonly used by attackers to surveil
STEPS TAKEN FOR PREVENTION
Back up critical informatipon Authenticate network users Create mechanism for reporting
problems in workplace Reduce system vulnerability in attack
situation
FUTURE OF CYBER TERRORISM
In the future, cyberterrorism may become a viable option to traditional physical acts of violence due to: Anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are neede
CONCLUSION
Cyber terrorism can be reduced by creating the awareness programmes between people and developing security system of computers
REFFERENCES
WWW.Google.com www.wikipedia.com