+ All Categories
Home > Documents > Cyber terrorism by_Ali_Fahad

Cyber terrorism by_Ali_Fahad

Date post: 18-May-2015
Category:
Upload: aliuet
View: 3,236 times
Download: 1 times
Share this document with a friend
Popular Tags:
16
3 October 2001 Cyberterrorism/P McGregor 1
Transcript
Page 1: Cyber terrorism by_Ali_Fahad

3 October 2001 Cyberterrorism/P McGregor 1

Page 2: Cyber terrorism by_Ali_Fahad

Presenter

Ali Fahad

2

Page 3: Cyber terrorism by_Ali_Fahad

Cyberterrorism

The Bloodless War?

2 January 2012 CyberTerrorism/Ali Fahad

Page 4: Cyber terrorism by_Ali_Fahad

CyberTerrorism

Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, hacking.

2 January 2012 CyberTerrorism/Ali Fahad

Page 5: Cyber terrorism by_Ali_Fahad

Strategies of Cyber Terrorism

The basic elements are:Hacking Breaking into others systemVirus writingElectronic snooping Acquiring others private informationOld-fashioned human spying

Terrorist first must compromise private and secure networks

52 January 2012 CyberTerrorism/Ali Fahad

Page 6: Cyber terrorism by_Ali_Fahad

6

Why Use Cyber Warfare?

Low barriers to entry – laptops cost a lot less than tanksComplex societies are dependent on computers and networksOnline Banking and money storageCompanies stores data onlineDifferent Countries

2 January 2012 CyberTerrorism/Ali Fahad

Page 7: Cyber terrorism by_Ali_Fahad

Forms of Cyber Terrorism

7

Bank Threatening

Personal Information Gain

Gaining Publicity

Assassination

Data Stealing

2 January 2012 CyberTerrorism/Ali Fahad

Page 8: Cyber terrorism by_Ali_Fahad

8

Commercial Sector a Key Target

Communication systems News organizations Network suppliers

Corporations Component suppliers (boots, food, radios, etc.) Civilian consulting companies

Financial institutions Government funds tied up in commercial banks

Healthcare industry Pharmacies, hospitals, clinics Drug companies (vaccines, antibiotics)

2 January 2012 CyberTerrorism/Ali Fahad

Page 9: Cyber terrorism by_Ali_Fahad

9

But Companies Not the Only Targets

Power grids For 11 days in Feb 2001, a development server at cal-

ISO electricity exchange was left connected to the internet and was being quietly hacked

Personal Data Terrorist hacks the computers and access personal data

for the their use.

2 January 2012 CyberTerrorism/Ali Fahad

Page 10: Cyber terrorism by_Ali_Fahad

Effects of CyberTerrorism

Harming effects on economy

Damages to websites

Cyberterrorism ranges from simple hacking and computer viruses to causing of terror war using computer

2 January 2012 CyberTerrorism/Ali Fahad 10

Page 11: Cyber terrorism by_Ali_Fahad

Cyber Terrorism in Pakistan

Many cases found in Pakistan during last decade.

Naeem Noor Khan, an alleged al-Qaeda operative and computer expert, was arrested in Pakistan in 2004 and files found on his laptop contained details of a plot to attack US financial buildings and locations in Britain.

112 January 2012 CyberTerrorism/Ali Fahad

Page 12: Cyber terrorism by_Ali_Fahad

Steps By Pakistan

Pakistan government has taken serious step to abandon cyberterrorism in Pakistan.Federal Intelligence Agency NR3C

(National Response Center for Cyber Crimes)

Electronic Transaction Ordinance 2002

Cyber Crime bill 2007

122 January 2012 CyberTerrorism/Ali Fahad

Page 13: Cyber terrorism by_Ali_Fahad

132 January 2012 CyberTerrorism/Ali Fahad

Page 14: Cyber terrorism by_Ali_Fahad

Pakistan sets death penalty for cyber

terrorism

Pakistan has taken the unprecedented step of making cyber terrorism a crime punishable by death, according to a decree issued by President Asif Ali Zardari.

142 January 2012 CyberTerrorism/Ali Fahad

Page 15: Cyber terrorism by_Ali_Fahad

15

What Can We Do?

Go on the defensive now Educate senior management on risks of cyberwarfare Make information security a top priority Enhance your security technology

Help government and security agencies IT ISAC PCF ( Pakistan Cyber Force) NR3C

2 January 2012 CyberTerrorism/Ali Fahad

Page 16: Cyber terrorism by_Ali_Fahad

162 January 2012 CyberTerrorism/Ali Fahad


Recommended