Cracking down on international cyberterrorism

Post on 23-Feb-2016

35 views 0 download

description

Cracking down on international cyberterrorism. presentation BY SUNNY PATEL, DARIA POTAPOVA, RYAN RICHARDS. WHY CYBERTERRORISM IS IMPORTANT?. Cyber terrorism – the use of computing resources to imitate or coerce others. Hacking is the leading cause of data breaches; - PowerPoint PPT Presentation

transcript

CRACKING DOWN ON

INTERNATIONAL

CYBERTE

RRORISM

P R E S E N T A T I ON B

Y SU N N Y P

A T E L , DA R I A

P O T A P O V A , RY A N R

I CH A R D S

WHY CYBERTERRORISM IS IMPORTANT?Cyber terrorism – the use of computing resources

to imitate or coerce others. Hacking is the leading cause of data breaches; Hacking groups are typically loosely affiliated

and rapidly expanding (which makes them very dangerous). They may include members from around the world and the number of members can range from tens to thousands;

Hacked data is irrelevant, biased and unreliable for auditors and accountants, which can potentially cost thousands to the companies.

WHY GOVERNMENT’S ROLE IN CRACKING DOWN CYBER TERRORISM IS IMPORTANTNumber of attacks by hackers is increasing –

companies need to have effective systems of internal controls in place to prevent, detect and correct the attacks.

Companies need help in fighting those attacks.Governments need to take responsibility and

crack down on these cyber terrors.

ANONYMOUS• Emerged in 2003 on the imageboard 4chan

online chat• Has no leaders, no hierarchical structure, and

no geographical epicenter

ANONYMOUS• Many members are motivated by freedom of

information;• Famous for coordinating a range of

disconnected actions from trolling to political protests;

• Technically, the group is open to all and has no boundaries to participation;

LULZSEC• Small in size, but performed significant

damages;• Main reason for attacks is for lulz• Helped raise the public awareness about

hackers• Lulzsec did not participate in selling hacked

information

RED HACKER ALLIANCE• Largest hacking group in the world;• ‘an independent confederation of patriotic

youth dedicated to defending China against perceived threats to national dignity’

• Was formed in response to the 1998 ethnic riots in Indonesia;

• Many consider affiliation of Chinese government to RHA;

• Since it’s origination RHA has been involved in at least five major cyber conflicts;

RED HACKER ALLIANCEAttacks:• CNN • Against the US Geological survey• NASA• Cornell University• More than 100 other US government and business sites

GOVERNMENT RESPONSES TO HACKERSProperly train government personnel Investment in research and developmentPromote international cooperation among

governments; crucial to fighting cyber terrorism worldwide.

Raise the security levels on critical accounting infrastructures, where the detection and response of an intrusion is immediate.

GOVERNMENTS RESPONSE TO HACKERS (CONT’D)

United States• In 2008, then-President Bush created the

Comprehensive National Cybersecurity Initiative (CNCI)• Establishing a front line defense by creating shared

situational awareness to improve the government’s ability to prevent intrusions

Europe Europol, a European law enforcement agency

February 28, 2012, Europol arrested four individuals in a coordinated operation against hacktivists claiming to be part of the Anonymous collective

GOVERNMENTS RESPONSE TO HACKERS (CONT’D)Canada• Created Canada’s Cyber Security Strategy in 2010

Purpose is to “invest in securing the Government of Canada systems, as well as partnering with other governments and with industry to ensure systems vital to Canadian security are protected.”

China Enacted new laws to fight cyber-terrorism despite

controversies of China’s involvement New law enacted prosecutes the “acquisition of

computer system data or control of computer systems and prohibit supplying programs or tools for the purpose of intrusion into computer systems “

CONCLUSION:Few simple things to protect yourself from cyber-

terrorism:• All company accounts should have passwords

and the passwords should be difficult to unfold;• Network configurations should be changed

when defects become known;• Check with venders for upgrades and patches;• Audit systems and check logs to help in

detecting and tracing an intruder.