37
Kashif Latif

Cyber Space

Embed Size (px)

DESCRIPTION

Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.

Citation preview

Page 1: Cyber Space

Kashif Latif

Page 2: Cyber Space

Cyber Space

• Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.

• In effect, cyberspace can be thought of as the interconnection of human beings through computers and telecommunication, without regard to physical geography.

Page 3: Cyber Space

Threats in Cyberspace

1. Hacktivism2. Cybercrime3. Cyberespionage4. Cyberwar5. Cyberterrorism

Page 4: Cyber Space

1. Hacktivism

Page 5: Cyber Space

Hacktivism

• Hacktivism is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience

Page 6: Cyber Space

Defacing Web Pages

• Defacing Web Pages: Between 1995 and 1999 Attrition.org reported 5,000 website defacements. In such a scenario, the hacktivist will significantly alter the front page of a company's or governmental agency's website.

Page 7: Cyber Space

Web Sit-ins

• In this form of hacktivism, hackers attempt to send so much traffic to the site that the overwhelmed site becomes inaccessible to other users in a variation on a denial of service.

Page 8: Cyber Space

E-mail Bombing

• E-mail Bombing: Hacktivists send scores of e-mails with large file attachments to their target's e-mail address.

Page 9: Cyber Space

Website Mirroring

• It is used as a circumvention tool to bypass censorship blocks on websites. It is a technique that copies the content of a censored website and posts it to other domains and subdomains that are not censored.

Page 10: Cyber Space

Geo-bombing

• Geo-bombing: a technique in which netizens add a geo-tag while editing YouTube videos so that the location of the video can be displayed in Google Earth.

Page 11: Cyber Space

Anonymous blogging

• Anonymous blogging: a method of speaking out to a wide audience about human rights issues, government oppression, etc. that utilizes various web tools such as free email accounts, IP masking, and blogging software to preserve a high level of anonymity.

Page 12: Cyber Space

Doxing

• Doxing is the practice of outing of private information about individuals, but the term is sometimes used more broadly to refer to exposing embarrassing information about organizations

Page 13: Cyber Space

Swatting

• Swatting is the act of triggering a police raid, usually that of an anti-terrorist team SWAT in the United States, typically for retaliation or harassment and based on providing false information to law enforcement.

Page 14: Cyber Space

Cyber crime

Page 15: Cyber Space

Cyber crimeComputer crimeComputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the targetNet crimeNet crime refers to criminal exploitation of the Internet.

Page 16: Cyber Space

Cybercrimes

• Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

• Such crimes may threaten a nation’s security and financial health.

Page 17: Cyber Space

Cybercrimes

• Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Page 18: Cyber Space

Categories of Cybercrimes

Cyber crime encompasses a broad range of activities. Generally, however, it may be divided into two categories:(1) crimes that target computers directly(2) crimes facilitated by computer networks or devices, the primary target of which is independent of network or device.

Page 19: Cyber Space

Categories of Cybercrimes

1.Crimes that primarily target computer networks or devices include:1. Computer viruses2. Denial-of-service attacks3. Malware (malicious code)2.Crimes that use computer networks or devices to advance other ends include:4. Cyber stalking5. Fraud and identity theft6. Information warfare7. Phishing scams

Page 20: Cyber Space

computer virus

• A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Page 21: Cyber Space

denial-of-service attack (DoS attack)

In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Page 22: Cyber Space

Malware

• Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware' is a general term used to refer to a variety of forms of hostile or intrusive software

Page 23: Cyber Space

Cyberstalking

• Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress

Page 24: Cyber Space

Fraud

Fraud is intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation, though the specific criminal law definition varies by legal jurisdiction. Defrauding people or entities of money or valuables is a common purpose of fraud.

Page 25: Cyber Space

Identity theft

• Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.

• The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions.

• Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

Page 26: Cyber Space

Information Warfare

• Information Warfare (IW) is primarily an American concept involving the use and management of information technology in pursuit of a competitive advantage over an opponent.

• Information warfare may involve collection of tactical information, assurance that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulate the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare.

Page 27: Cyber Space

Phishing

• Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

• Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware

Page 28: Cyber Space

Cyber terrorism

Page 29: Cyber Space

Cyber terrorism

Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Page 30: Cyber Space

Types of cyber terrorism

Simple-UnstructuredThe capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability.

Page 31: Cyber Space

Types of cyber terrorism

Advanced-StructuredThe capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability.

Page 32: Cyber Space

Types of cyber terrorism

Complex-Coordinated:The capability for a coordinated attacks capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target analysis, command and control, and organization learning capability

Page 33: Cyber Space

Cyber crime

Halder and Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".

Page 34: Cyber Space

Cyber crime

• Such crimes may threaten a nation’s security and financial health.

• Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright, child pornography, and child grooming.

• There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

Page 35: Cyber Space

The Computer Crime and Intellectual Property Section (CCIPS)

• The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

• CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts.

• Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively. The Section's enforcement responsibilities against intellectual property crimes are similarly multi-faceted.

Page 36: Cyber Space

The Computer Crime and Intellectual Property Section (CCIPS)

• Intellectual Property (IP) has become one of the principal U.S. economic engines, and the nation is a target of choice for thieves of material protected by copyright, trademark, or trade-secret designation. In pursuing all these goals, CCIPS attorneys regularly run complex investigations, resolve unique legal and investigative issues raised by emerging computer and telecommunications technologies; litigate cases; provide litigation support to other prosecutors; train federal, state, and local law enforcement personnel; comment on and propose legislation; and initiate and participate in international efforts to combat computer and intellectual property crime.

Page 37: Cyber Space

Thank You…!