3 October 2001   Cyberterrorism/P McGregor   1
Presenter Ali Fahad             2
Cyberterrorism                 The Bloodless War?2 January 2012          CyberTerrorism/Ali Fahad
CyberTerrorism        Cyberterrorism is the use of Internet based        attacks in terrorist activities, including acts  ...
Strategies of Cyber                             Terrorism        The basic elements are:            Hacking              ...
Why Use Cyber Warfare?        Low barriers to entry – laptops cost a lot        less than tanks        Complex societies a...
Forms of Cyber Terrorism         Bank Threatening         Personal Information Gain         Gaining Publicity         Assa...
Commercial Sector a Key                      Target        Communication systems            News organizations          ...
But Companies Not the Only                 Targets        Power grids            For 11 days in Feb 2001, a development s...
Effects of CyberTerrorism        Harming effects on economy        Damages to websites        Cyberterrorism ranges from s...
Cyber Terrorism in Pakistan        Many cases found in Pakistan during last decade.        Naeem Noor Khan, an alleged al-...
Steps By Pakistan          Pakistan government has taken serious step          to abandon cyberterrorism in Pakistan.     ...
2 January 2012   CyberTerrorism/Ali Fahad   13
Pakistan sets death penalty for                      cyber terrorism        Pakistan has taken the unprecedented step     ...
What Can We Do?        Go on the defensive now            Educate senior management on risks of cyberwarfare            ...
2 January 2012   CyberTerrorism/Ali Fahad   16
Upcoming SlideShare
Loading in...5
×

Cyber terrorism by_Ali_Fahad

3,658
-1

Published on

1 Comment
2 Likes
Statistics
Notes
  • goooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooddddddddddddddddddddddddddddddddddddddddddddddddddddd
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
3,658
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
261
Comments
1
Likes
2
Embeds 0
No embeds

No notes for slide

Cyber terrorism by_Ali_Fahad

  1. 1. 3 October 2001 Cyberterrorism/P McGregor 1
  2. 2. Presenter Ali Fahad 2
  3. 3. Cyberterrorism The Bloodless War?2 January 2012 CyberTerrorism/Ali Fahad
  4. 4. CyberTerrorism Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, hacking.2 January 2012 CyberTerrorism/Ali Fahad
  5. 5. Strategies of Cyber Terrorism The basic elements are:  Hacking Breaking into others system  Virus writing  Electronic snooping Acquiring others private information  Old-fashioned human spying Terrorist first must compromise private and secure networks2 January 2012 CyberTerrorism/Ali Fahad 5
  6. 6. Why Use Cyber Warfare? Low barriers to entry – laptops cost a lot less than tanks Complex societies are dependent on computers and networks Online Banking and money storage Companies stores data online Different Countries2 January 2012 CyberTerrorism/Ali Fahad 6
  7. 7. Forms of Cyber Terrorism Bank Threatening Personal Information Gain Gaining Publicity Assassination Data Stealing2 January 2012 CyberTerrorism/Ali Fahad 7
  8. 8. Commercial Sector a Key Target Communication systems  News organizations  Network suppliers Corporations  Component suppliers (boots, food, radios, etc.)  Civilian consulting companies Financial institutions  Government funds tied up in commercial banks Healthcare industry  Pharmacies, hospitals, clinics  Drug companies (vaccines, antibiotics)2 January 2012 CyberTerrorism/Ali Fahad 8
  9. 9. But Companies Not the Only Targets Power grids  For 11 days in Feb 2001, a development server at cal- ISO electricity exchange was left connected to the internet and was being quietly hacked Personal Data  Terrorist hacks the computers and access personal data for the their use.2 January 2012 CyberTerrorism/Ali Fahad 9
  10. 10. Effects of CyberTerrorism Harming effects on economy Damages to websites Cyberterrorism ranges from simple hacking and computer viruses to causing of terror war using computer2 January 2012 CyberTerrorism/Ali Fahad 10
  11. 11. Cyber Terrorism in Pakistan Many cases found in Pakistan during last decade. Naeem Noor Khan, an alleged al-Qaeda operative and computer expert, was arrested in Pakistan in 2004 and files found on his laptop contained details of a plot to attack US financial buildings and locations in Britain.2 January 2012 CyberTerrorism/Ali Fahad 11
  12. 12. Steps By Pakistan Pakistan government has taken serious step to abandon cyberterrorism in Pakistan. Federal Intelligence Agency  NR3C (National Response Center for Cyber Crimes) Electronic Transaction Ordinance 2002 Cyber Crime bill 20072 January 2012 CyberTerrorism/Ali Fahad 12
  13. 13. 2 January 2012 CyberTerrorism/Ali Fahad 13
  14. 14. Pakistan sets death penalty for cyber terrorism Pakistan has taken the unprecedented step of making cyber terrorism a crime punishable by death, according to a decree issued by President Asif Ali Zardari.2 January 2012 CyberTerrorism/Ali Fahad 14
  15. 15. What Can We Do? Go on the defensive now  Educate senior management on risks of cyberwarfare  Make information security a top priority  Enhance your security technology Help government and security agencies  IT ISAC  PCF ( Pakistan Cyber Force)  NR3C2 January 2012 CyberTerrorism/Ali Fahad 15
  16. 16. 2 January 2012 CyberTerrorism/Ali Fahad 16
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×