Date post: | 19-Jul-2015 |
Category: |
Technology |
Upload: | - |
View: | 53 times |
Download: | 0 times |
Presented by:
Alena Popova
Cyber Terrorism
WHAT IS CYBERCRIME?
• It is a criminal activity
committed on internet.
• In general “It is a unlawful act
wherein computer is either a
tool or target or both”
IT INCLUDES THE FOLL CONDUCTS…
• llegal access
• Illegal interception
• System interference
• Data interference
• Misuse of devices
• Fraud
• Forgery
• The Motivations Behind Attacks chart confirms the prevalence of
hacktivism with 56% of occurrences, exactly the same percentage
observed in January. Cyber Crime is stable at number two, even if its
percentage dropped from 40% to 31%. It is interesting to notice, month
after month, the growing number of Cyber Espionage campaigns
discovered.
WHY SHOULD WE CARE ?
• It is important for computing
professionals to understand cyber
terrorism for benefit of themselves,
their profession & society as whole.
• The computer is being used as a new
weapon to obtain results similar to use
of bombs, kidnapping…etc.
THREATS TO COMPUTER SYSTEM
• Hacking - Computer Hacking
is a practice of peeping into
the extreme technical details
of any computer application,
program, or the whole
system in order to extend its
capabilities or alter its
functionalities. People who
rightly follow this practice of
hacking are termed as
‘hackers’.
CONTINIOUS…
• Spoofing - spoofing is a technique whereby an attacker sends fake Address
Resolution Protocol (ARP) messages onto a Local Area Network. Generally,
the aim is to associate the attacker’s MAC address with the IP address of
another host , causing any traffic meant for that IP address to be sent to the
attacker instead.
CONTINIOUS…
• Viruses
• Computer viruses have harmed millions of computer around the world. Computer virus is a small malicious software computer program that is intentionally developed to harm computer software. It spreads from computer to computer and interferes with the functioning and performance of a computer. When a computer is infected with a virus, it runs slowly and becomes sluggish. There are problems with web-browsing. It fails to run smoothly, hangs, crashes, freezes, stops responding and gets frequent errors and restarts.
PROTECTION AGAINST THREATS
• New technology to monitor cyber Terrorism Cyber Café
Monitoring System. This technology comprises of a biometric
system for recording finger prints of persons who use a
workstation.
CONCLUSION
• Without careful attention to
these issues, the uncontrolled
interconnection of existing
system on which people and
organization are critically
dependent will continue to
create huge, ill defined and
defenseless super system.
• So we must pay attention to all
those issues and protect world
from cyber crime and terrorism