21
CYBER TERRORISM Submitted by: Abhashree Pradhan 0501227096 8CA (1)

Cyber Terrorism

Embed Size (px)

Citation preview

Page 1: Cyber Terrorism

CYBER TERRORISM

Submitted by:Abhashree Pradhan05012270968CA (1)

Page 2: Cyber Terrorism

CONTENTS

Introduction New risks and threats Cause of cyber attack Vulenarability types Methods of cyber terrorism Examples Steps for prevention Conclusion

Page 3: Cyber Terrorism

INTRODUCTION

Cyberterrorism is a criminal act Perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.

Page 4: Cyber Terrorism

New Risks and Threats

Globalization of infrastructures increases level of vulnerability

Easy access to infrastructures via Internet and Public Switched Telecommunications Network

Interdependencies of systems make attack consequences harder to predict and perhaps more severe due to the cascading effects

Malicious tools and recipes for new cyber weapons are widely available and do not require a high degree of technical skill to use

Page 5: Cyber Terrorism

WHY CYBER ATTACK S?

It is Cheaper than traditional methods.

They can hide their personalities and location.

They can use this method to attack a big number of targets.

They can use this method to attack a big number of targets.

The action is very Difficult to be tracked.

Page 6: Cyber Terrorism

Vulnerability Types

.Computer based Poor passwords

.Facility based Servers in unprotected areas Inadequate physical security measures

Lack of appropriate firewall protection

Page 8: Cyber Terrorism

METHODS OF CYBER TERRORISM

Some of weapons: Radio frequency weapons/High

powered microwave Transient electrmagnetic device Viruses,Logic bombs,Trojan horse Denial of services

Page 9: Cyber Terrorism

RF WEAPONS

Fries the electrical component of target

Consists of power source, apparatus to generate RF , antenna

RF energy entered through frontend/backend

Expensive , complex, require more power, large in size

Page 10: Cyber Terrorism

TRANSIENT ELECTROMAGNETIC DEVICE

Emits a large” spike “burst of energy Spike targets large spectrum of

space Smaller, cheaper, technically

supported

Page 11: Cyber Terrorism

ELECTRO MAGNETIC BOMBS

Creats electromagnetic pulse It creats current between 10 to 1000

times greater than a lightening strike

Page 12: Cyber Terrorism

Logic bombs: It is a program that may be maliciously modified to fail when certain conditions are met.

Trojan horse: A program that overtly does one thing while covertly doing another.

Virus: A specific type of Trojan horse that can be used to spread its “infection” from one computer to another.

Page 13: Cyber Terrorism

HACKTISM

Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue.

Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.

Page 14: Cyber Terrorism

Cyber Facilitated Terrorism Cyber Facilitated Terrorism is terrorism using cyber means as a tool for accomplishing the act.

Example: A terrorist sends an email message to a Senator stating that 50 anonymous letters have been sent to the office, each containing large amounts of anthrax.

Page 15: Cyber Terrorism

EXAMPLES OF CYBER TERRORISM

Terrorists created an active x control for internet that can trick quicken accounting program into removing money from user’s account

Created viruses and trojan horses to make networks useless

Hacking the hospital computers Spreading different rumor through

internet Threaten large banks

Page 16: Cyber Terrorism

PREVENTION OF CYBER TERRORISM

Cources offered free of charges to technical perssonel from public safety, law enforcement ,health care providers

Implement network designImprove modern technologyAnalyze modern and emerging attack

methodologyOperate various software tools /services

commonly used by attackers to surveil

Page 17: Cyber Terrorism

STEPS TAKEN FOR PREVENTION

Back up critical informatipon Authenticate network users Create mechanism for reporting

problems in workplace Reduce system vulnerability in attack

situation

Page 18: Cyber Terrorism

FUTURE OF CYBER TERRORISM

In the future, cyberterrorism may become a viable option to traditional physical acts of violence due to: Anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are neede

Page 19: Cyber Terrorism

CONCLUSION

Cyber terrorism can be reduced by creating the awareness programmes between people and developing security system of computers

Page 20: Cyber Terrorism

REFFERENCES

WWW.Google.com www.wikipedia.com