12
INTRODUCTION : If cyber terrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure. It can also include attacks on Internet business, but when this is done for economic motivations rather than ideological, it is typically regarded as cybercrime. Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyber terrorism is defined by the Technolytics Institute as "The premeditated use of DIFFERENCE BETWEEN REAL WORLD PHYSICAL TERRORISM AND CYBER TERRORISM 1. Chances of capture, injury, or death to a cyber terrorist are less 2. Cyber terrorism is difficult to track 3. Easy to accomplish due to lack of understanding of security risks

document on cyber terrorism

Embed Size (px)

Citation preview

Page 1: document on cyber terrorism

INTRODUCTION :

If cyber terrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure. It can also include attacks on Internet business, but when this is done for economic motivations rather than ideological, it is typically regarded as cybercrime.

Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyber terrorism is defined by the Technolytics Institute as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives."

DIFFERENCE BETWEEN REAL WORLD PHYSICAL TERRORISM AND CYBER TERRORISM

1. Chances of capture, injury, or death to a cyber terrorist are less 2. Cyber terrorism is difficult to track 3. Easy to accomplish due to lack of understanding of security risks

Page 3: document on cyber terrorism
Page 4: document on cyber terrorism
Page 5: document on cyber terrorism
Page 6: document on cyber terrorism
Page 7: document on cyber terrorism

• Crackers -A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.

• White Hat Hackers – Hackers who break into computers. They have no right to access but they often report the security leaks to the victims.

• Script bunnies - People who would like to be hackers but don’t have much technical expertise. They download click-and-point software that automatically does the hacking for them.

Page 8: document on cyber terrorism

• In 2001 ,12 billion dollars in losses due to security breaches, virus attacks and hacked network

• The NIMDA virus alone accounted for 2 billion dollars in losses

• The Mydoom virus sent 100 million infected e-mails in the first 36 hours, and accounted for roughly a quarter of global e-mail traffic on Jan. 26, 2004.

• The pessimists claim that cyber attacks cost $10-$15 billion per year and would cost tens of billions more to fix, the optimists claim that all cyber crime over a five year period cumulatively cost only $1 billion and fixing the current vulnerabilities would only cost $4-$5 billion more.

Page 9: document on cyber terrorism

FRAMEWORK FOR CYBER ATTACKS:

REFERENCES: http://essays.ssrc.org/sept11/essays/denning.htm

http://www.washingtonpost.com/wp-dyn/content/article/2010/03/04/AR2010030405066.html

http://en.wikipedia.org/wiki/Cyberterrorism

http://csciwww.etsu.edu/gotterbarn/stdntppr/

http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html

www.symantec.com/avcenter/reference/cyberterrorism.pdf

http://searchsecurity.techtarget.com/definition/cyberterrorism

http://www.crime-research.org/library/Cyber-terrorism.htm

http://www.ncsa.com

Attacks

Physical AccessAttacks

--Wiretappi

ngServer

HackingVandalis

m

Dialog Attacks

--Eavesdropp

ingImpersonat

ionMessage

Alteration

Penetration

Attacks

Social Engineering

--Opening

AttachmentsPassword

TheftInformation

Theft

Scanning

(Probing)

Break-in

Denial ofServi

ce

Malwar

e--

Viruses

Worms

Page 10: document on cyber terrorism

ACKNOWLEDGEMENTS:Designing this poster required the efforts of many people. Therefore, I would like to take this opportunity to thank many of those who gave their valuable time and suggestions.Firstly I would thank Mr. Surendra Kumar Yadav (HOD, CS&IT dept. JNIT) for providing his support and appreciation to the work.Next I would thank Mr. Vijay Mohan Shrimal and Mr. Madhav Sharma (Faculty, CS&IT, JNIT) for providing their incredible support and suggestions while working on this poster,Last but not the least I would thank all of my friends and co-mates for their help and support.The authors would like to thank Jagan Nath Gupta Institute of Engineering and Technology for his valuable advice, support and guidance during the preparation of this paper.

OBJECTIVE:

The poster presents all about the cyber terrorism. It has had relatively wide impact on the cyber network, due to the substantial investment it is required to develop security measures. This has radically changed over the last years due to the technological advancements in the industry. Many organizations like FBI, OPSEC, NATO etc. are working to prevent the network from cyber attacks.

CONCLUSION:

It is impossible to ignore the fact of how extreme cyber terrorism can and will be in the future to come. Cyber terrorism may be more preventable than actual physical attacks on cities, civilians and other countries. To combat with cyber terrorism we require more diligence and cooperation with countries and allies. We should be doing the reliance on automation and less human intervention which could open the doors for future attacks.

Page 11: document on cyber terrorism