+ All Categories
Home > Technology > Cyberterrorism final

Cyberterrorism final

Date post: 18-May-2015
Category:
Upload: sudheerreddy59
View: 3,937 times
Download: 1 times
Share this document with a friend
Description:
Complete description about cyberterrorism....!
Popular Tags:
17
CYBER TERRORISM CYBER TERRORISM
Transcript
Page 1: Cyberterrorism final

CYBER TERRORISMCYBER TERRORISM

Page 2: Cyberterrorism final

Cyber terrorism is the convergence of Cyber terrorism is the convergence of terrorism and cyberspace. It is terrorism and cyberspace. It is

generally understood to mean unlawful generally understood to mean unlawful attacks and threats of attack against attacks and threats of attack against

computers, networks, and the computers, networks, and the information stored therein when done information stored therein when done to intimidate or coerce a government to intimidate or coerce a government

or its people in furtherance of political or its people in furtherance of political or social objectives.or social objectives.

Page 3: Cyberterrorism final

Cyber Terrorism Cyber Terrorism India Cornwall

Page 4: Cyberterrorism final

Background InformationBackground Information

Public interest in cyber terrorism began Public interest in cyber terrorism began in the late 1980s. As the year 2000 in the late 1980s. As the year 2000 approached, the fear and uncertainty approached, the fear and uncertainty about the about the millennium bugmillennium bug heightened and heightened and interest in potential cyber terrorist attacks interest in potential cyber terrorist attacks also increasedalso increased . .

Page 5: Cyberterrorism final

What Do We Know?What Do We Know?

Cyber attacks immediately follow physical Cyber attacks immediately follow physical attacksattacks

Cyber attacks are increasing in volume, Cyber attacks are increasing in volume, sophistication, and coordinationsophistication, and coordination

Cyber attackers are attracted to high-value Cyber attackers are attracted to high-value targetstargets

Many, if not most, targets would probably be Many, if not most, targets would probably be commercial computer and communications commercial computer and communications systemssystems

Page 6: Cyberterrorism final

Effects of cyber terrorism.Effects of cyber terrorism. Cyber terrorism in past.Cyber terrorism in past. Cyber terrorism in future.Cyber terrorism in future.

Page 7: Cyberterrorism final

Model train controlled via brain-Model train controlled via brain-machine interface.machine interface.

--By Hitachi using optical Topography

Page 8: Cyberterrorism final

BCI :Brain Computer InterfaceBCI :Brain Computer Interface

Page 9: Cyberterrorism final

““Sample Nuclear Launch Sample Nuclear Launch While Under Cyber Attack”While Under Cyber Attack”

[yes, this [yes, this isis a doctored photo, used here just to lighten a serious moment] a doctored photo, used here just to lighten a serious moment]Source:Source: http://www.armscontrolwonk.com/1955/missile-palooza http://www.armscontrolwonk.com/1955/missile-palooza

Page 10: Cyberterrorism final

What Can We Do?What Can We Do?

Go on the defensive Go on the defensive nownow– Educate senior management on risks of Educate senior management on risks of

cyberwarfare cyberwarfare – Make infosec a top priorityMake infosec a top priority– Beef up your security technologyBeef up your security technology– Insist on flawless execution: compliance to Insist on flawless execution: compliance to

security standards in all areassecurity standards in all areas Work with other companies, government Work with other companies, government

agenciesagencies– NIPCNIPC– IT ISACIT ISAC– SAINTSAINT

Page 11: Cyberterrorism final

What can be done to prevent an What can be done to prevent an electronic terrorist attack?electronic terrorist attack?

Effective use of intelligence gathered from Effective use of intelligence gathered from all sourcesall sources

Continued enhancement of resourcesContinued enhancement of resourcesPublic/Private interactionPublic/Private interactionComputer security and awareness trainingComputer security and awareness trainingContinuing education regarding terrorist Continuing education regarding terrorist

trends and methodologiestrends and methodologiesPerpetual readiness to defend against Perpetual readiness to defend against

attacksattacks

Page 12: Cyberterrorism final

Some Specifics: Some Specifics: Be PreparedBe Prepared

Maintain high alert & vigilanceMaintain high alert & vigilance Update OS and applications regularlyUpdate OS and applications regularly Enforce strong passwordsEnforce strong passwords ““Lock down" systemsLock down" systems Keep anti-virus software installed and up-to-Keep anti-virus software installed and up-to-

datedate Employ intrusion detection systems and Employ intrusion detection systems and

firewallsfirewalls

Page 13: Cyberterrorism final

Department of Homeland Security Transition

Computer Intrusion Section

Cyber Investigations Branch

Deputy Assistant Director

Assistant Director

Cyber DivisionCyber DivisionFBI HeadquartersFBI Headquarters

Cyber Crime SectionOutreach, Capability and

Development Section

National InfrastructureProtection Center

Analysis and Warning Section

Outreach, Training andStrategy Section

Special Assistant

Operational Support Staff

Special TechnologiesAnd Applications Section

Page 14: Cyberterrorism final

Cyber Investigations BranchCyber Investigations Branch

Cyber Crim e/IntellectualProperty Rights Unit

Internet FraudCom plaint Center

Innocent ImagesUnit

Internet FraudUnit

Cyber CrimeSection

Crim inal Com puterIntrusion Unit

CounterterrorismCounteringelligenceCom puter Intrusion

Unit

Cyber Action Team &Cyber Intelligence

Center

Com puter IntrusionSection

Infrastructure &Engineering Unit

Special TechnologiesResearch &

Developm ent Unit

Technical AnalysisUnit

Cyber OperationsDeploym ent Unit

Special Technologies andApplications Section

Specialized TrainingUnit

Cyber Task ForceSupport Unit

Public and PrivateAlliance Unit

InternationalInvestigations Support

Unit

Outreach, Capability andDevelopm ent Section

Operational SupportStaff

Deputy AssistantDirector

Cyber InvestigationsBranch

Page 15: Cyberterrorism final

Where Can I Find Out More? Where Can I Find Out More?

Symantec White Paper on Cyber Terrorism by Sarah Gordon http://www.symantec.com/avcenter/reference/cyberterrorism.pdf

Australian Government Institute of Criminology: http://www.aic.gov.au/topics/cybercrime/cyberterror.html

IWS - The Information Warfare Site http://www.iwar.org.uk/index.htm

Dorothy E. Denning's Website http://www.cs.georgetown.edu/~denning/

Page 16: Cyberterrorism final

Queries ??Queries ??

Page 17: Cyberterrorism final

Thank you !Thank you !


Recommended