Post on 16-Jul-2015
transcript
INTRODUCTION ABOUT TOPICS
What is Cyber Terrorism? Types Of Cyber Terrorism Effects To Cyber Terrorism For Our Environment Statistics on Cyber Terrorism Insider Statistics in World -Economic CYBER TERRORISM TOOK PLACE WORLD WIDE Example in cyber terrorism effects in world wide Cost & Means Of Attack Security Framework for Enterprise 25 Attack History in World Conclusion Any Query????????
Presented by :-Sanjay Pariyar M.
1.What is Cyber Terrorism?
• A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber-terrorists spread computer viruses, and others threaten people electronically.
• Some ways they do this hacking networks and computers to find out personal information.
• The attacker distributes things that draw huge amount of attention to get information about people.
• Since computers are so powerful, downloading software for cyber terrorism is easy.
Types of Cyber Terrorism
I. Simple Unstructured
II. Advanced Structured
III. Complex Co-ordinated
This method doesn't do much because it can't carry out as much information.Example:- data remove etc.
This method has multiple systems and it has more control, freedom and creativity towards the attack.Example:-Banking Robbery,ATM Failure etc.
This method has intense hacking tools and is highly capable of target analysis, command, control and learning capability.Ex:-Airlines Crash,Building Crash, power Outages, System Down, Telephone Outages etc.
Effects To Cyber Terrorism For Our Environment
• There are a double different affects of cyber terrorism. One is financial damage. Cyber terrorism doesn’t just do damage to one person, but a mass amount of people at one time.
• Since cyber terrorism effects the economy so much, it can weak in ones country making its defense system not as strong to other terrorist attacks.
• Cyber terrorism can destroy a nation, financially, and all its security. Also, it can interrupt electrical systems and can lead to potential death.
• Some people don't think its very serious because they don't get nervous but in reality it could ruin a nation and kill a mass amount of people. The affects are very serious and even though a bomb isn't thrown or a plane isn't flown through buildings it can still be a very serious.
• Most people feel that military stations, air traffic control centers, banks and telecommunication networks are the most common targets but others are police, rescue systems and etc.
• The graph below shows amateur hackers. They are the most threat on the Internet, they are responsible for about 90% of all activity.
• Some times the govt. carries out an attack to test its defense system. They have found 88% of 3000 attacks. 96% of the entries weren't detected but 4% were and 5% were reported and investigated.
• In 1996, they found 40 major attacks loosing over 800 million to computer break ins.
• The FBI estimates that $138 million is lost every year to hackers. Over three years they have reported 40 threats but nothing serious.
• One time a Russian hacker, tapped into Citibank's funds and took $10 million.
Statistics on Cyber Terrorism
INSIDER STATISTICS IN WORLD- ECONOMICSabotage $ 871,000
System Penetration
Website Defacement
$ 901,500
$ 958,100
Misuse of public web Apps
Telecom Fraud
Abuse of wireless Network
Financial Fraud
Unauthorized Access
Laptop Theft
$ 2,747,000
$ 3,997,500
$ 4,278,205
$ 6,734,500
$ 7,670,500
$ 10,159,250
Insider Net Abuse $ 10,601,055
Theft of Proprietary info. $ 11,460,000
Denial of Service $ 26,064,050
Virus $ 55,053,900
Total Losses for 2004= Rs.141,496,560
0m 30m 40m 50m10m 20m 60m
Fourteen Crore Fourteen Lakh Ninety Six Thousand Five hundred Sixty.
CYBER TERRORISM TOOK PLACE WORLD WIDE
• The breakage to the banking of the country. Flooding the whole city with sewage waste.
• Cyber Crime has emerged as new level of terrorism world wide. which may even happen in India.
Jamming the per of whole city. (i.e.) The blocking of power stations.
The Bombarding of the computers connected to internets.
• Robbery of the international banks. Breaking into the plane onboard computer system forcing it to crash.
The complexity of the cyber terrorism is that this attacks can be carried out by terrorists any where in world without even touching our soil with free of cost.
Example in cyber Terrorism Effects in World Wide
ATM Failure
Power Outages
Poisoned Water Supply
Bridge Down
World Trade Center
Airlines Crash
Oil Refinery Fire
Telephone Outages
911 System Down
Cost & Means Of Attacks
1945 1955 1960 1970 -1975 1985 Today
Invasi
on
Strategic
Nuclear
Weapon
s
Missiles
ICBM & SLBMCruise Missile
Precisi
on
Guided
Muniti
ons
Computer
Availability of Capability
Cost of
Capability
Security OfficerProject leader for all security Related Matter
Physical Security
Access To Building
Physical Assets(Generic)
IT Hardware(computer,PSDs,
Printers)
Vehicle Fleets
Operation Manager +
Security Staffs
PeopleSecurity
PermanentStaff
Contract Staff
Third Party Employees
PartnersVisitor
Special EventsSecurity
HR+
Security Staff
IT Manager +Teams/HR/Fraud
Trades Secrets
Employee Data
Database(Market
Intelligence)
Customer Data(as Protected Under DPD)
DataSecurity
Networks
Remotes Sites
Remotes User
Application Security
Websites
Intranet
Documentation Work &
Procedures
Emergency Response Plans
(ERPs)
Business continuity Plans
(BC)Disaster
Recovery Plans(DR)
IT Manager +
Teams
Operation Manager
+IT Teams/HR
IT Security
Disaster RecoveryBusiness Cont.
BEST SECURITIES FRAMEWORK FOR ORGANIZATION
1. Flame 2. July 2009 cyber attacks 3.Candidate Government Hacking
4.PayPal 5.Project Chanology 6. 4Chan
7. India 8. Stuxnet 9.Opi Israel
10.Operation Aurora
13.HPS 14.Hannafd Bros
16. TJX
12.CityGroup11. Spamhaus Project
17.Sven Jaschan
15.Operation Shady Rat
18.Michael Calce
19. Presidential-Level Espionage
24.Titan Rain23. Moonlight Maze22. Epsilon
21. The Estonian Cyber war20.Sony
25. The Original Logic Bomb
Conclusion
Our National Security ,Databases and Economy are extremely dependent upon Automation .
Therefore ,There exist a ”Target Rich Environment” for those who would harm via Internet. So first priority is most Power High-tech Security in this environment.
Our Critical Infrastructure required joint Private/Public Efforts to Protect Them.
ANY QUERY