+ All Categories
Home > Documents > Cyber Terrorism ppt

Cyber Terrorism ppt

Date post: 26-Mar-2015
Category:
Upload: saurabhparikh27
View: 3,182 times
Download: 6 times
Share this document with a friend
23
Cyber terrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a Cyber terrorism
Transcript
Page 1: Cyber Terrorism ppt

• Cyber terrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.

Cyber terrorism

Page 2: Cyber Terrorism ppt

Cyberterrorism

Cyber terrorism occurs when the destructive nature of the “act itself” is carried out via computers or other cyber/electronic means.

Example: Terrorists hack critical infrastructure system (such as a telephone switch) causing a loss of communication for an extended period of time.

Page 3: Cyber Terrorism ppt

Cyber Terrorism

• Cyber terrorism is generally understood as the crossing over of terrorism and cyberspace. This leads to unlawful attacks and threats of attacks against computer, networks and the info stored therein.

• In order to qualify as cyber terrorism an attack results in violence against person or property, or at least causes enough harm to generate fear.

• Many of these attacks are done using powerful software applications made readily available across the world wide web.

Page 4: Cyber Terrorism ppt

Cyber Terrorism

Open war is upon you whether you would risk it or not

• Cyberspace is constantly under attack, be it from spies, thieves, saboteurs or thrill seeking 11 year olds. DOS attacks are launched, data is sabotaged, inbox’s are flamed. Not to mention the countless virus’s that are released, many make use of fraudulent transactions and harass workers, companies, and home users.

• These attacks are serious, and costly.

Page 5: Cyber Terrorism ppt

Cyber terrorism

• In order for Cyber Terrorism to work two things must happen, there must be targets that are vulnerable to attack which could lead to violence and harming someone; and also somebody to carry out these threats.

Page 6: Cyber Terrorism ppt

Cyber Terrorism

• We can clearly see that the infrastructure is weak and can be manipulated by various mean…but what of the people who have the ability to do this…is there motive. This is why Cyber Terrorism is so dangerous, most hackers do posses the knowledge, but lack the motivation to create such violence and severe disruption. However many terrorist pride themselves on his ability.

• Despite the many actions of the few, there are few indications that this is going to become a widespread tactic of terrorists.

Page 7: Cyber Terrorism ppt

Cyber Terrorism

• Three groups have been defined:

• Simple unstructured: Conduct basic hacks against individuals using tools created by someone else. Little command and control.

• Advanced structured (2-4): Conduct more sophisticated attacks against multiple systems or networks and possibly the ability to create or modify tools. Elementary command and control.

• Complex coordinated(6-10): Capability for coordinated attacks causing mass disruption, integrated defenses including cryptography, Ability to create sophisticated hacking tools. Highly capable command and control.

Page 8: Cyber Terrorism ppt

Cyber Terrorism

Drawbacks - • Systems are complex, and thus harder to control an

attack.• Unless people are injured there is less drama and

emotional appeal• Terrorist close minded, and less likely to switch from old

means of attack unless inadeuqate

Page 9: Cyber Terrorism ppt

Cyber Terrorism

• In conclusion at the present cyber terrorism to the extreme is not as much of a burden, however general cyber crime is very much a part of today’s cyberspace; and cyber terrorism is very likely to be a few years in the future but nevertheless coming.

Page 10: Cyber Terrorism ppt
Page 11: Cyber Terrorism ppt

Imagine Planning for These Contingencies

Page 12: Cyber Terrorism ppt

Why Cyber Attack on Critical Infrastructures?

National Security– Reduce the U.S.’s ability to protect its

interests Public Psyche

– Erode confidence in critical services and the government

Economic impact– Damage economic systems

Enhancement of Physical Attacks– Physical damage/distraction efforts

Asymmetric Warfare– Lack of attribution, low cost/high

potential impact

Page 13: Cyber Terrorism ppt

Vulnerability TypesComputer based

– Poor passwords– Lack of appropriate protection/or

improperly configured protectionNetwork based

– Unprotected or unnecessary open entry points

Personnel based– Temporary/staff firings– Disgruntled personnel– Lack of training

Facility based– Servers in unprotected areas– Inadequate security policies

Page 14: Cyber Terrorism ppt
Page 15: Cyber Terrorism ppt

Cyber Terrorism Prevention – Old Methods for New

Problem Liaison Critical Infrastructure Companies,

i.e. FBI InfraGardInternet Service ProvidersUniversitiesInternet CafesHacker clubsIT companies, developersInternational, local law

enforcement Look – on the Internet Coordinate - national security,

terrorist personnel

Page 16: Cyber Terrorism ppt

Sophistication of Cybercrime

• Simple Unstructured: Individuals or groups working with little structure, forethought or preparation

• Advanced Structured: Groups working with some structure, but little forethought or preparation

• Complex Coordinated: Groups working with advance preparation with specific targets and objectives.

Page 17: Cyber Terrorism ppt

Terrorist Groups

Page 18: Cyber Terrorism ppt

The Future of Terrorism

Terrorism is carried out by disrupting activities, undermining confidence, and creating fear.

In the future, cyberterrorism may become a viable option to traditional physical acts of violence due to:– Anonymity– Diverse targets– Low risk of detection– Low risk of personnel injury– Low investment– Operate from nearly any location– Few resources are needed

Page 19: Cyber Terrorism ppt

What can be done to prevent an electronic terrorist attack?

Effective use of intelligence gathered from all sources

Continued enhancement of resourcesPublic/Private interactionComputer security and awareness trainingContinuing education regarding terrorist trends

and methodologiesPerpetual readiness to defend against attacks

Page 20: Cyber Terrorism ppt

Commercial Sector a Key Target

Communication systems News organizations Telephony suppliers

Corporations Component suppliers (boots, food, radios, etc.) Civilian consulting companies

Financial institutions Government funds tied up in commercial banks

Healthcare industry Pharmacies, hospitals, clinics Drug companies (vaccines, antibiotics)

Page 21: Cyber Terrorism ppt

But Companies Not the Only Targets

Power grids For 11 days in Feb 2001, a development server at

cal-ISO electricity exchange was left connected to the internet and was being quietly hacked

Transportation systems “A foreign adversary could significantly hinder U.S.

Forces in reaching, say, the Persian gulf or Taiwan straits by attacking the computers at commercial harbor facilities used to ship ammunition or the air traffic control system that would be needed to support and airlift personnel and supplies” (Bruce Berkowitz)

Water authorities

Page 22: Cyber Terrorism ppt

Some Specifics: Be Prepared

Maintain high alert & vigilanceUpdate OS and applications regularlyEnforce strong passwords“Lock down" systemsKeep anti-virus software installed and up-to-dateEmploy intrusion detection systems and firewalls

Page 23: Cyber Terrorism ppt

Recommended