Cyber terrorism


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber terrorism

  1. 1. Cyber-Terrorism
  2. 2. What is cyber-terrorism?• "The premeditated, politically motivated attackagainst information, computer systems, computerprograms, and data which result in violence againstnoncombatant targets by sub-national groups orclandestine agents". -FBI• "The use of computer network tools to shut downcritical national infrastructure (such as energy,transportation, government operations) or tocoerce or intimidate a government or civilianpopulation". -Center for Strategic/Int’l Studies
  3. 3. Types• Logic Bombs• Phishing• Sniffer• Trojan Horse• Virus• War Driving• Worm• Zero-Day Exploit
  4. 4. The cyber threat• As our nations critical infrastructure becomes morereliant on computer networks in order to operate,there is an increased concern that these aredesired targets.ExamplesElectric Power SystemWater Supply SystemAir Traffic Control SystemsHealthcare Systems
  5. 5. Why cyber threats?• Cyber terrorist prefer using the cyber attackmethods because of many advantages for it.It is Cheaper than traditional methods.• The action is very Difficult to be tracked.• There are no physical barriers or check points tocross.• They can hide their personalities and location.• They can use this method to attack a big number oftargets.• They can do it remotely from anywhere in the world.• They can affect a large number of people.
  6. 6. Cyber-terrorism Examples• Started about mid1990s around the time of the internetboom.• 1997: Web site set up for Zapatistas, a Mexican rebelgroup, to lead attacks against U.S. military from 1,500locations in 50 different countries.• 1999: NATO computers are blasted with e-mail bombsand hit with denial-of-service attacks by hacktivistsprotesting the bombings in Kosovo.• 2000: Assassins hack into a hospital computer to changethe medication of a patient so that he would be given alethal injection. He was dead within a few hours.
  7. 7. Phishing• Phishing is a way of attempting to acquireinformation such as usernames, passwords,and credit card details by masquerading asa trustworthy entity in an electroniccommunication. Communicationspurporting to be from popular social websites, auction sites, online paymentprocessors or IT administrators are commonlyused to lure the unsuspecting public.• Back
  8. 8. War driving• War driving is the act ofsearching for Wi-Fi wirelessnetworks by a person in amoving vehicle, using aportable computer,smartphone or personal digitalassistant (PDA).• Back
  9. 9. zero-day• A zero-day (or zero-hour or day zero) attackor threat is a computer threat that tries toexploit computer application vulnerabilitiesthat are unknown to others or the softwaredeveloper. Zero-day exploits (actualsoftware that uses a security hole to carryout an attack) are used or shared byattackers before the developer of the targetsoftware knows about the vulnerability.• Back
  10. 10. Sniffer• Sniffer may refer to:• Packet analyzer (aka network analyzer, protocolanalyzer or sniffer), computer software or hardware thatcan intercept and log traffic passing over a digitalnetwork• Allan Clarke (footballer), the Leeds Utd and Englandstriker known by that nickname• a program that tracks a person straight to their IP andcomputer• equipment used in a cars tailpipe during an emissionstest• equipment used as leak detector in vacuum technic• Back
  11. 11. logic bomb• A logic bomb is a piece of codeintentionally inserted into a softwaresystem that will set off a maliciousfunction when specified conditions aremet. For example, a programmer mayhide a piece of code that startsdeleting files (such as a salarydatabase trigger), should they ever beterminated from the company.• Back
  12. 12. Trojan• A Trojan may give a hackerremote access to a targetedcomputer system. Once a Trojanhas been installed on a targetedcomputer system, hackers may begiven remote access to thecomputer allowing them toperform all kinds of operations• Back
  13. 13. worm• A computer worm is a standalone malwarecomputer program that replicates itself in orderto spread to other computers. Often, it uses acomputer network to spread itself. This is due tosecurity shortcomings on the target computer.Unlike a computer virus, it does not need toattach itself to an existing program. Wormsalmost always cause at least some harm to thenetwork, even if only by consuming bandwidth,whereas viruses almost always corrupt or modifyfiles on a targeted computer.• Back
  14. 14. computer virus• A computer virus is a computer programthat can replicate itself[1] and spreadfrom one computer to another. The term"virus" is also commonly, but erroneouslyused, to refer to other types of malware,including but not limited to adware andspyware programs that do not have areproductive ability• Back