SlideShare a Scribd company logo
1 of 16
3 October 2001   Cyberterrorism/P McGregor   1
Presenter


 Ali Fahad


             2
Cyberterrorism

                 The Bloodless War?



2 January 2012          CyberTerrorism/Ali Fahad
CyberTerrorism

        Cyberterrorism is the use of Internet based
        attacks in terrorist activities, including acts
        of deliberate, large-scale disruption of
        computer networks, especially of personal
        computers attached to the Internet, by the
        means of tools such as computer viruses,
        hacking.

2 January 2012            CyberTerrorism/Ali Fahad
Strategies of Cyber
                             Terrorism
        The basic elements are:
            Hacking
                 Breaking into others system
          Virus writing
          Electronic snooping
                 Acquiring others private information
            Old-fashioned human spying
        Terrorist first must compromise private and
        secure networks
2 January 2012                      CyberTerrorism/Ali Fahad   5
Why Use Cyber Warfare?
        Low barriers to entry – laptops cost a lot
        less than tanks
        Complex societies are dependent on
        computers and networks
        Online Banking and money storage
        Companies stores data online
        Different Countries


2 January 2012          CyberTerrorism/Ali Fahad     6
Forms of Cyber Terrorism


         Bank Threatening
         Personal Information Gain
         Gaining Publicity
         Assassination
         Data Stealing

2 January 2012          CyberTerrorism/Ali Fahad   7
Commercial Sector a Key
                      Target
        Communication systems
            News organizations
            Network suppliers
        Corporations
            Component suppliers (boots, food, radios, etc.)
            Civilian consulting companies
        Financial institutions
            Government funds tied up in commercial banks
        Healthcare industry
            Pharmacies, hospitals, clinics
            Drug companies (vaccines, antibiotics)

2 January 2012                CyberTerrorism/Ali Fahad         8
But Companies Not the Only
                 Targets
        Power grids
            For 11 days in Feb 2001, a development server at cal-
             ISO electricity exchange was left connected to the
             internet and was being quietly hacked
        Personal Data
            Terrorist hacks the computers and access personal data
             for the their use.




2 January 2012                  CyberTerrorism/Ali Fahad              9
Effects of CyberTerrorism

        Harming effects on economy

        Damages to websites

        Cyberterrorism ranges from simple hacking
        and computer viruses to causing of terror war
        using computer


2 January 2012          CyberTerrorism/Ali Fahad        10
Cyber Terrorism in Pakistan

        Many cases found in Pakistan during last decade.
        Naeem Noor Khan, an alleged al-Qaeda operative
        and computer expert, was arrested in Pakistan in
        2004 and files found on his laptop contained
        details of a plot to attack US financial buildings
        and locations in Britain.




2 January 2012               CyberTerrorism/Ali Fahad        11
Steps By Pakistan

          Pakistan government has taken serious step
          to abandon cyberterrorism in Pakistan.
          Federal Intelligence Agency
           NR3C
          (National Response Center for Cyber Crimes)
          Electronic Transaction Ordinance 2002
          Cyber Crime bill 2007

2 January 2012                CyberTerrorism/Ali Fahad   12
2 January 2012   CyberTerrorism/Ali Fahad   13
Pakistan sets death penalty for
                      cyber terrorism


        Pakistan has taken the unprecedented step
        of making cyber terrorism a crime
        punishable by death, according to a decree
        issued by President Asif Ali Zardari.



2 January 2012              CyberTerrorism/Ali Fahad   14
What Can We Do?

        Go on the defensive now
            Educate senior management on risks of cyberwarfare
            Make information security a top priority
            Enhance your security technology


        Help government and security agencies
            IT ISAC
            PCF ( Pakistan Cyber Force)
            NR3C


2 January 2012               CyberTerrorism/Ali Fahad             15
2 January 2012   CyberTerrorism/Ali Fahad   16

More Related Content

What's hot

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber crime
cyber crimecyber crime
cyber crime
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 

Viewers also liked

"Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?""Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?"Stephen Leadholm
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Introduction to map reduce
Introduction to map reduceIntroduction to map reduce
Introduction to map reduceM Baddar
 
Modern Algorithms and Data Structures - 1. Bloom Filters, Merkle Trees
Modern Algorithms and Data Structures - 1. Bloom Filters, Merkle TreesModern Algorithms and Data Structures - 1. Bloom Filters, Merkle Trees
Modern Algorithms and Data Structures - 1. Bloom Filters, Merkle TreesLorenzo Alberton
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6Rekha Yadav
 

Viewers also liked (17)

CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
"Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?""Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?"
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
C01.8 terrorism
C01.8 terrorismC01.8 terrorism
C01.8 terrorism
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Algorithms for Cloud Computing
Algorithms for Cloud ComputingAlgorithms for Cloud Computing
Algorithms for Cloud Computing
 
Introduction to map reduce
Introduction to map reduceIntroduction to map reduce
Introduction to map reduce
 
Terrorism
TerrorismTerrorism
Terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Modern Algorithms and Data Structures - 1. Bloom Filters, Merkle Trees
Modern Algorithms and Data Structures - 1. Bloom Filters, Merkle TreesModern Algorithms and Data Structures - 1. Bloom Filters, Merkle Trees
Modern Algorithms and Data Structures - 1. Bloom Filters, Merkle Trees
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Ipv6
Ipv6Ipv6
Ipv6
 
IPV6 ppt
IPV6 pptIPV6 ppt
IPV6 ppt
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
IPv6
IPv6IPv6
IPv6
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 

Similar to Cyber terrorism by_Ali_Fahad

CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxNigussMehari4
 
Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka zigix
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxOlusegun Mosugu
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safetyAashiGupta46
 

Similar to Cyber terrorism by_Ali_Fahad (20)

cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Lecture_2.pptx.pdf
Lecture_2.pptx.pdfLecture_2.pptx.pdf
Lecture_2.pptx.pdf
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
188
188188
188
 
Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 

Cyber terrorism by_Ali_Fahad

  • 1. 3 October 2001 Cyberterrorism/P McGregor 1
  • 3. Cyberterrorism The Bloodless War? 2 January 2012 CyberTerrorism/Ali Fahad
  • 4. CyberTerrorism Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, hacking. 2 January 2012 CyberTerrorism/Ali Fahad
  • 5. Strategies of Cyber Terrorism The basic elements are:  Hacking Breaking into others system  Virus writing  Electronic snooping Acquiring others private information  Old-fashioned human spying Terrorist first must compromise private and secure networks 2 January 2012 CyberTerrorism/Ali Fahad 5
  • 6. Why Use Cyber Warfare? Low barriers to entry – laptops cost a lot less than tanks Complex societies are dependent on computers and networks Online Banking and money storage Companies stores data online Different Countries 2 January 2012 CyberTerrorism/Ali Fahad 6
  • 7. Forms of Cyber Terrorism Bank Threatening Personal Information Gain Gaining Publicity Assassination Data Stealing 2 January 2012 CyberTerrorism/Ali Fahad 7
  • 8. Commercial Sector a Key Target Communication systems  News organizations  Network suppliers Corporations  Component suppliers (boots, food, radios, etc.)  Civilian consulting companies Financial institutions  Government funds tied up in commercial banks Healthcare industry  Pharmacies, hospitals, clinics  Drug companies (vaccines, antibiotics) 2 January 2012 CyberTerrorism/Ali Fahad 8
  • 9. But Companies Not the Only Targets Power grids  For 11 days in Feb 2001, a development server at cal- ISO electricity exchange was left connected to the internet and was being quietly hacked Personal Data  Terrorist hacks the computers and access personal data for the their use. 2 January 2012 CyberTerrorism/Ali Fahad 9
  • 10. Effects of CyberTerrorism Harming effects on economy Damages to websites Cyberterrorism ranges from simple hacking and computer viruses to causing of terror war using computer 2 January 2012 CyberTerrorism/Ali Fahad 10
  • 11. Cyber Terrorism in Pakistan Many cases found in Pakistan during last decade. Naeem Noor Khan, an alleged al-Qaeda operative and computer expert, was arrested in Pakistan in 2004 and files found on his laptop contained details of a plot to attack US financial buildings and locations in Britain. 2 January 2012 CyberTerrorism/Ali Fahad 11
  • 12. Steps By Pakistan Pakistan government has taken serious step to abandon cyberterrorism in Pakistan. Federal Intelligence Agency  NR3C (National Response Center for Cyber Crimes) Electronic Transaction Ordinance 2002 Cyber Crime bill 2007 2 January 2012 CyberTerrorism/Ali Fahad 12
  • 13. 2 January 2012 CyberTerrorism/Ali Fahad 13
  • 14. Pakistan sets death penalty for cyber terrorism Pakistan has taken the unprecedented step of making cyber terrorism a crime punishable by death, according to a decree issued by President Asif Ali Zardari. 2 January 2012 CyberTerrorism/Ali Fahad 14
  • 15. What Can We Do? Go on the defensive now  Educate senior management on risks of cyberwarfare  Make information security a top priority  Enhance your security technology Help government and security agencies  IT ISAC  PCF ( Pakistan Cyber Force)  NR3C 2 January 2012 CyberTerrorism/Ali Fahad 15
  • 16. 2 January 2012 CyberTerrorism/Ali Fahad 16