cyber terrorism

22
Nov 4, 2014 A Warm Welcome To All Of U A Warm Welcome To All Of U

Upload: sherrysher82

Post on 14-Jul-2015

132 views

Category:

Data & Analytics


4 download

TRANSCRIPT

Nov 4, 2014

A Warm Welcome To All Of UA Warm Welcome To All Of U

Nov 4, 2014

CYBER TERRORISM : An Emerging Threat

Presented by:- HimansHu baksHi

Nov 4, 2014

DEFINATION

The word “ CYBER TERRORISM” refers to two terms : cyberspace and terrorism.

“Cyber terrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”

Nov 4, 2014

HACKING AND CRACKING

"Unauthorized Access to a Computer Network" which may otherwise be called an "Unauthorized Intrusion".

Technically, a ‘ Hacker ’ is someone that seeks to understand the computer, phone or other systems strictly for the satisfaction of having that knowledge.

Cracker is the common term used to describe a malicious hacker. Crackers get into all kinds of mischief, including breaking or "cracking" copy protection on software programs, breaking into systems and causing harm, changing data, or stealing.

Nov 4, 2014

ENCRYPTION

Encryption refers to process of converting the original information into an encrypted ( coded ) form called as cipher, so that it is intelligible only to someone who knows how to ‘decrypt’ it to obtain the original message.

There are two main types of encryption: # symmetric encryption # asymmetric encryption (also called public-key encryption)

Nov 4, 2014

ORIGIN OF CYBER TERRORISM

The credit for the emergence of cyber terrorism goes to crackers. The main motive of crackers is to achieve personal profits without caring for his own nation and the mankind.To satisfy their desire for money the crackers start associating with various terrorists organizations giving rise to so called ‘cyber terrorism’.

Nov 4, 2014

MORE DANGEROUS THAN CONVENTIONAL METHODS

Cyber Warfare Depth

Social

PoliticalEconomicPhysical

Military

United States

ConventionalWarfare

CyberWarfare

Nov 4, 2014

TECTICS OF CYBER TERRORISM

Security information manipulation and data theft Distributed denial of services (DDOS) attack Network damage and disruption

Nov 4, 2014

WEAPONS OF CYBER TERRORISTS

Cracking Encryption Viruses Worms Trojan horse Logic bombs

Nov 4, 2014

OVERVIEW OF TERRORIST WEBSITES

From the Middle East, Hamas ( the Islamic Resistance Movement ), the Lebanese Hezbollah ( Party of God ) ,, the Popular Front for the Liberation of Palestine (PFLP), the People's Mujahedin of Iran.

From Europe , the Basque ETA movement , Armata Corsa ( the Corsican Army ), and the Irish Republican Army (IRA).

From Latin America, the Colombian National Liberation Army ( ELN-Colombia ), and the Armed Revolutionary Forces of Colombia (FARC).

From Asia, al Qaeda, the Japanese Red Army (JRA), Hizb-ul Mujehideen in Kashmir , the Liberation Tigers of Tamil Eelam (LTTE ) , the Islamic Movement of Uzbekistan (IMU), , the

Pakistan-based Lashkar-e-Taiba, and the rebel movement in Chechnya.

Nov 4, 2014

CONTENTS OF TERRORIST WEBSITES

History of organization

Biographies of their leaders

Maps of areas in disputes

Irrelevant reasons in support of their violent activities

Nov 4, 2014

TARGETS OF THESE WEBSITES

Current and potential supporters International public opinion Enemy publics

Nov 4, 2014

APPEAL FOR CYBER TERRORISM

Cheaper than traditional methods Action is difficult to trace No physical barriers Variety and number of targets Can be conducted remotely Less physical training and no risk of mortality A large number of people are affected

Nov 4, 2014

HOW TERRORISTS USE THE INTERNET ?

Psychological warfare Publicity and propaganda Data mining Fund raising Recruitment and mobilization Networking Sharing information Planning and coordination

Nov 4, 2014

DANGERS OF CYBER TERRORISM

Remotely accessing the processing control systems of a cereal manufacturer to change the levels of iron supplement of the cereal for the purpose of sickening and killing the children of a nation.

The disruption of banks, international financial transactions and stock exchanges, causing the people of a country and foreign investors to lose all confidence in the target nation's economic system.

Attacking a target nation's air traffic control systems to cause two large civilian aircraft to collide. Much of the same can be done to the rail lines and domestic mass transit system.

Nov 4, 2014

Contd. Remote alteration of the formulas of medication at various

pharmaceutical manufacturers. The potential loss of life is unfathomable.

Remotely changing of the pressure in the gas lines, causing a valve failure and a gas pipe explosion. Likewise, the electrical

grid is also vulnerable to such attacks.

Remotely overriding of a heavy chemical manufacturing plant's internal safety monitoring systems, thereby leading to the devastation of the plant and the contamination of the plant's surrounding area with hazardous chemicals.

Water could be contaminated with untreated waste or high levels of chlorine or other chemicals by attacks on control systems via wireless, modem or Internet access.

Nov 4, 2014

SOME MAJOR CYBER ATTACKS

In 1998, Ethnic Tamil guerrillas swamped Sri Lankan embassies with over 800 e-mails a day for more than two weeks. Intelligence authorities claim that this was first known attack by the terrorists against a country's IT infrastructure.

One of the worst examples of cyber terrorism was in 2003 when the crackers in Romania illegally gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved.

In May 2007, Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Talinn. The attack was a distributed denial of service attack in which nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline.

Nov 4, 2014

Contd.

India and Pakistan have engaged in a long-term dispute over Kashmir. The dispute moved into the cyberspace when pro-Pakistan hackers began repeatedly attacking the computers in India. The number of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by the end of August 2001.

Israel-Palestine conflict saw its first cyber attacks in October 2000 when some Israeli teenagers launched DOS attacks against the computers maintained by various Palestinian terrorist organizations – Hezbollah and Hamas. The Anti-Israel hackers responded almost immediately and crashed several Israeli web sites by flooding them with bogus traffic.

Nov 4, 2014

DETERRING CYBER TERRORISM

Psychological operations (PSYOPS)

Electronic warfare

Intrusion Detection System ( IDS )

Nov 4, 2014

CONCLUSION

Nov 4, 2014

Nov 4, 2014