• Like
Upcoming SlideShare
Loading in...5


Uploaded on

Cyber terrorism

Cyber terrorism

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. CYBER TERRORISM By S. Sai Praveen 12761A055
  • 2. OVERVIEW • Terms • Cyber-terrorists • Why cyber-terrorism • Forms of cyber-terrorism • Impact • Effects • Examples • Conclusion
  • 3. TERMS • Cyber terrorism – The use of the Net for terrorism. • Cyber crime – The use of the Net for criminal actions. • Cyber Attacks – Email bombs, viruses, intentional actions. • Information Warfare – Formalized governmental warfare • Techno Terrorism – Use of technology by terrorist groups
  • 4. CYBER-TERRORISTS An individual that uses computernetwork technology (i.e., networks, computers, Internet) to cause intense fear; one who uses computernetwork technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.
  • 5. • Cyber terrorist prefer using the cyber attack methods because of many advantages for it
  • 6. • It is cheaper than traditional methods
  • 7. • The action is very difficult to be tracked
  • 8. • They can hide their personalities and location
  • 9. • There are no physical barries or check to cross
  • 10. • Big targets can be attacked • The tremendous, nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets
  • 11. Forms of CYBER-TERRORISM 1.Privacy Violation: • The law of privacy is the • recognition of the individual's right to be let alone and to have his personal space inviolate. Man has become sensitive to publicity.
  • 12. 2.Secret information appropriation and data theft: • Information technology • misuses the data of private individuals A computer network owned by the Government may contain valuable information concerning defence and other top secrets.
  • 13. 3.Distributed denial of Service Attack • The cyber terrorists may also use • the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them.
  • 14. 4.Network Damage and Disruption: • This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier.
  • 15. What would the Impact be? The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems or used in support of a physical attack to cause further confusion and possible delays in proper response 1.Direct Cost Implications. 2.Indirect Cost Implications.
  • 16. Terrorists Groups
  • 17. Sample Nuclear Launch While Under Cyber Attack
  • 18. Effects • Cyber terrorism can have a serious large-scale • influence on significant number of people. It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.
  • 19. Cyberspace The New Realm of Warfare
  • 20. Examples • Terrorists in Romania gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved. • The official web site of the Presidential Palace of Afghanistan was affected by a DOS attack that rendered it inaccessible.
  • 21. • The internet has provided a virtual war for countries having problems with other such. * As taiwan against China. * Israel against Palestine. *India against pakistan, China
  • 22. What does a terrorist group achieve with a cyber attack that they can’t with a conventional attack?
  • 23. Attacks are doubling each year
  • 24. How can we protect ourselves? • All accounts should have passwords and the passwords should be unusual, difficult to guess • Change the network configuration when defects become visible • Audit systems and check logs to help in detecting and tracing an intruder • If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it
  • 25. CONCLUSION • After a close look at some of the facts, I have come to the these conclusions. Some of my conclusions point to the fact that Cyberterrorism could be an actually threat. But the other part is that there is too much media hype created around the possiblity of a Cyberterrorism.
  • 26. Praveen Akonssp