+ All Categories
Home > Law > Current issues on cyber terror presentation

Current issues on cyber terror presentation

Date post: 08-Aug-2015
Category:
Upload: brianandre
View: 53 times
Download: 0 times
Share this document with a friend
Popular Tags:
8
Current Issues and Concepts on Cyber Terror Brian Cardenas 03/1/2015 Arizona Western College (AJS 200-700)
Transcript
Page 1: Current issues on cyber terror presentation

Current Issues and Concepts on Cyber TerrorBrian Cardenas03/1/2015Arizona Western College (AJS 200-700)

Page 2: Current issues on cyber terror presentation

Paul Wilkinson (1976): Terrorist Typologies -Concepts

Four Types of Terrorism• Criminal: Defined as the planned

use of terror for financial and material gain.

EX: Drug Cartels• Psychic: Terrorism related to

magical beliefs, myths, and superstitions induced by fanatical religious beliefs.

• War: The annihilation of the enemy through whatever means possible.

• Political: Political -Systematic use of violence and fear to achieve a political objective.

Page 3: Current issues on cyber terror presentation

Current Issues regarding Cyber Terrorism

On December 24, 2014 the United States was facing a big debate about the released of the movie: “The Interview” by James Franco & Seth Rogen. • A group of Korean hackers, hacked the

entire FBI website by publishing an embarrassing video in the website.

• The reason why the FBI website got hacked was because the North Korean government felt that the film hurt the dignity of its supreme leader Kim Jong-un

• Also, the Korean group made threats of violence if the movie was release in any format. That is the reason why the movie The Interview wasn’t released and cancelled from all American theaters.

Page 4: Current issues on cyber terror presentation

6 Steps: How to Protect Control System

Page 5: Current issues on cyber terror presentation

WHO ARE THE HACKERS?

Page 6: Current issues on cyber terror presentation

Distribution of Targets May 2012

Page 7: Current issues on cyber terror presentation

5 steps: How To Protect Yourself From Cyber-Terror

1. All accounts should have passwords and the passwords should be unusual, difficult to guess.

2. Change the network configuration when defects become know.

3. Check with venders for upgrades and patches.4. Audit systems and check logs to help in detecting and

tracing an intruder5. If you are ever unsure about the safety of a site, or

receive suspicious email from an unknown address, don't access it. It could be trouble.

Page 8: Current issues on cyber terror presentation

Reference• Sperber, B. (2012, May 23). Solutions Emerge to Prevent Control

System Cyber-Attacks. Retrieved March 1, 2015, from http://www.automationworld.com/security/solutions-emerge-prevent-control-system-cyber-attacks

• Sproles, J., & Byars, W. (1998, January 1). Statistics On Cyber-terrorism. Retrieved March 1, 2015, from http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm

• Sproles, J., & Byars, W. (1998, January 1). Cyber-terrorism. Retrieved March 1, 2015, from http://csciwww.etsu.edu/gotterbarn/stdntppr/#Protect

• Passeri, P. (2012, June 10). May 2012 Cyber Attacks Statistics. Retrieved March 1, 2015, from http://hackmageddon.com/2012/06/10/may-2012-cyber-attacks-statistics/

• Wallace, H. (2014). Concepts of Terrorism. In Victimology: Legal, Psychological, and Social Perspectives (4th ed.). Fresno, California: MC Graw Hill Education.


Recommended