Date post: | 14-Jul-2015 |
Category: |
Data & Analytics |
Upload: | sherrysher82 |
View: | 132 times |
Download: | 4 times |
Nov 4, 2014
DEFINATION
The word “ CYBER TERRORISM” refers to two terms : cyberspace and terrorism.
“Cyber terrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”
Nov 4, 2014
HACKING AND CRACKING
"Unauthorized Access to a Computer Network" which may otherwise be called an "Unauthorized Intrusion".
Technically, a ‘ Hacker ’ is someone that seeks to understand the computer, phone or other systems strictly for the satisfaction of having that knowledge.
Cracker is the common term used to describe a malicious hacker. Crackers get into all kinds of mischief, including breaking or "cracking" copy protection on software programs, breaking into systems and causing harm, changing data, or stealing.
Nov 4, 2014
ENCRYPTION
Encryption refers to process of converting the original information into an encrypted ( coded ) form called as cipher, so that it is intelligible only to someone who knows how to ‘decrypt’ it to obtain the original message.
There are two main types of encryption: # symmetric encryption # asymmetric encryption (also called public-key encryption)
Nov 4, 2014
ORIGIN OF CYBER TERRORISM
The credit for the emergence of cyber terrorism goes to crackers. The main motive of crackers is to achieve personal profits without caring for his own nation and the mankind.To satisfy their desire for money the crackers start associating with various terrorists organizations giving rise to so called ‘cyber terrorism’.
Nov 4, 2014
MORE DANGEROUS THAN CONVENTIONAL METHODS
Cyber Warfare Depth
Social
PoliticalEconomicPhysical
Military
United States
ConventionalWarfare
CyberWarfare
Nov 4, 2014
TECTICS OF CYBER TERRORISM
Security information manipulation and data theft Distributed denial of services (DDOS) attack Network damage and disruption
Nov 4, 2014
OVERVIEW OF TERRORIST WEBSITES
From the Middle East, Hamas ( the Islamic Resistance Movement ), the Lebanese Hezbollah ( Party of God ) ,, the Popular Front for the Liberation of Palestine (PFLP), the People's Mujahedin of Iran.
From Europe , the Basque ETA movement , Armata Corsa ( the Corsican Army ), and the Irish Republican Army (IRA).
From Latin America, the Colombian National Liberation Army ( ELN-Colombia ), and the Armed Revolutionary Forces of Colombia (FARC).
From Asia, al Qaeda, the Japanese Red Army (JRA), Hizb-ul Mujehideen in Kashmir , the Liberation Tigers of Tamil Eelam (LTTE ) , the Islamic Movement of Uzbekistan (IMU), , the
Pakistan-based Lashkar-e-Taiba, and the rebel movement in Chechnya.
Nov 4, 2014
CONTENTS OF TERRORIST WEBSITES
History of organization
Biographies of their leaders
Maps of areas in disputes
Irrelevant reasons in support of their violent activities
Nov 4, 2014
TARGETS OF THESE WEBSITES
Current and potential supporters International public opinion Enemy publics
Nov 4, 2014
APPEAL FOR CYBER TERRORISM
Cheaper than traditional methods Action is difficult to trace No physical barriers Variety and number of targets Can be conducted remotely Less physical training and no risk of mortality A large number of people are affected
Nov 4, 2014
HOW TERRORISTS USE THE INTERNET ?
Psychological warfare Publicity and propaganda Data mining Fund raising Recruitment and mobilization Networking Sharing information Planning and coordination
Nov 4, 2014
DANGERS OF CYBER TERRORISM
Remotely accessing the processing control systems of a cereal manufacturer to change the levels of iron supplement of the cereal for the purpose of sickening and killing the children of a nation.
The disruption of banks, international financial transactions and stock exchanges, causing the people of a country and foreign investors to lose all confidence in the target nation's economic system.
Attacking a target nation's air traffic control systems to cause two large civilian aircraft to collide. Much of the same can be done to the rail lines and domestic mass transit system.
Nov 4, 2014
Contd. Remote alteration of the formulas of medication at various
pharmaceutical manufacturers. The potential loss of life is unfathomable.
Remotely changing of the pressure in the gas lines, causing a valve failure and a gas pipe explosion. Likewise, the electrical
grid is also vulnerable to such attacks.
Remotely overriding of a heavy chemical manufacturing plant's internal safety monitoring systems, thereby leading to the devastation of the plant and the contamination of the plant's surrounding area with hazardous chemicals.
Water could be contaminated with untreated waste or high levels of chlorine or other chemicals by attacks on control systems via wireless, modem or Internet access.
Nov 4, 2014
SOME MAJOR CYBER ATTACKS
In 1998, Ethnic Tamil guerrillas swamped Sri Lankan embassies with over 800 e-mails a day for more than two weeks. Intelligence authorities claim that this was first known attack by the terrorists against a country's IT infrastructure.
One of the worst examples of cyber terrorism was in 2003 when the crackers in Romania illegally gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved.
In May 2007, Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Talinn. The attack was a distributed denial of service attack in which nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline.
Nov 4, 2014
Contd.
India and Pakistan have engaged in a long-term dispute over Kashmir. The dispute moved into the cyberspace when pro-Pakistan hackers began repeatedly attacking the computers in India. The number of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of August 2001.
Israel-Palestine conflict saw its first cyber attacks in October 2000 when some Israeli teenagers launched DOS attacks against the computers maintained by various Palestinian terrorist organizations – Hezbollah and Hamas. The Anti-Israel hackers responded almost immediately and crashed several Israeli web sites by flooding them with bogus traffic.
Nov 4, 2014
DETERRING CYBER TERRORISM
Psychological operations (PSYOPS)
Electronic warfare
Intrusion Detection System ( IDS )