Date post: | 03-Apr-2018 |
Category: |
Documents |
Upload: | sameer-negi |
View: | 221 times |
Download: | 0 times |
of 15
7/28/2019 Cyber Op Ration
1/15
ALWAR INSTITUTE OF ENGINEERING AND TECHNOLOGY,ALWAR(RAJ.)Presentation on
Cyber operations can supplement a war,
but cannot be the war
Submit to:- Presentation by:-Pro. Ashok Kumar Dubey Deepak Mandolia
(H.O.D of I.T & C.S)
7/28/2019 Cyber Op Ration
2/15
Contents:-
Cyber war Define
Cyber war as thread unrelated even and strategic attack
Characteristics of cyber operation.
Cyber warriors. Psychology of modern warfare and hacking
form of cyber operation as a terrorism
Critical infrastructures
Direct and indirect cost implementations
conclusion
7/28/2019 Cyber Op Ration
3/15
Cyber war define :-
Use of computing resources to intimidate coerce or
harm people ,place or system in which we depend upon.According to the U.S. Federal Bureau of Investigation,
cyber terrorism is any "premeditated, politicallymotivated attack against information, computer
systems, computer programs, and data which results inviolence against non-combatant targets by sub-nationalgroups or clandestine agents."
hacking with a body count.
Section 66f.
7/28/2019 Cyber Op Ration
4/15
Cyber war is the biggest threat for India today:-
The next war that the country may have to usage
terror will be on internet . The networkinfrastructure of country may be attacked anytime social network site.
India may be the IT capital of the world, but veryfar from security issues are concerned the country
is lagging far behind.
7/28/2019 Cyber Op Ration
5/15
Unrelated even or strategic attack:-
ATM failure.
Power outages. Telephonic outages.
World trade center .
Airline crash.
Oil refinery fire.
Bridges down.
7/28/2019 Cyber Op Ration
6/15
Characteristics of cyber operations as terrorism:-
Cyber operations is safe and profitable.
Act must have scale and publicity . Cyber operation are difficult to counter without the right
expertise.
Cyber operation are difficult to understand the mind of
terrorist. Relatively anonymous.
If he /she is loss today then in future terrorism will use thatinformation against you tomorrow.
7/28/2019 Cyber Op Ration
7/15
Cyber warriors:-
The cyber operation will make certain that the population of
a nation will not able to eat or live . The people changes with protection of their nation will not
have warning and will not be able to shut down the theseterrorism operations.
7/28/2019 Cyber Op Ration
8/15
Psychology of modern warfare and hacking:-
For fun(31.4%)
Want to the best defacer(17.2%) No reason specified(14.7%)
Political reasons(11.5%)
Patriotism(10.9%)
As a challenge (10.8%)
Revenge(3.3%)
7/28/2019 Cyber Op Ration
9/15
form of cyber operation as a terrorism :-
Privacy violation
Secret information appropriation and datatheft
Demolition of e-governance base
Distributed denial of services
7/28/2019 Cyber Op Ration
10/15
Critical infrastructures:-
Government operations
Emergency services
Telecommunications
Electrical energyTransportation
Banking and finance
Water supply systemGas and oil storage
7/28/2019 Cyber Op Ration
11/15
Direct cost implementations:-
Loss of sales during the disruption
Network delays ,intermittent access forbusiness user
Loss of the intellectual propertyresearch
pricing etcCost of the critical communication in time of
the emergency
7/28/2019 Cyber Op Ration
12/15
Indirect cost implications:-
1. Loss of confidence in our financial system
2. Tarnished relationship is public image globally.3. Strained business partner relationship domestic
and internationally.
4. Loss of the customer revenues for an individualgroup of the companies.
5. Loss of trust in too government and companyindustry.
7/28/2019 Cyber Op Ration
13/15
What can be do:-
Coorperate and share intelligence among all agencies.
Learn new technology The tool of the count the cyber terrorist must be real
time and dynamic ,as the weapons will continue change.
More building ,Network and desktop security a priority.
Report instance of the cyber crime to the localenforcement agencies.
7/28/2019 Cyber Op Ration
14/15
Conclusion:-
The problem of the cyber terrorism is having varied fact anddimension.
Its solution requires rigorous application of energy andresources
Its must also because we have a tendency to make law whenthe problem at its zenith
7/28/2019 Cyber Op Ration
15/15
THANK YOU