NANDHA ENGINEERING
COLLEGE
ERODE-52
CYBER WAR-A NEW
FACE OF TERRORISM
Guided by
E.Kanimozhi ,M.E
AP/Dept of IT
PRESENTED BY
S.INDHUJA
G.KEERTHANA PREETHI
Objective:
Revenge
Politics
Protest
Disrupt the activities of an enemy

country
CYBER WAR
The use of computers to disrupt the
activities of an enemy country, especially the
deliberate attacking of commu...
Cyberterrorism Definition
1.

Political agenda

2.

Use of computers and cyberspace to disrupt
or destroy (may or may not ...
Cyber Terrorism
Cyber terrorism is the use of Internet
based attacks in terrorist activities,
including acts of deliberate...
 Cyber terrorism can be also defined as the
intentional use of computer networks, and
public internet to cause destructio...
Attack Targets
Cell phone worms.
Rootkits.
Trojans.
Spreading virus via trojans.
Distributed denial-of-service attack (DDoS)
A distributed denial-of-service (DDoS) attack
is one in which a multitude of c...
Cyberspace:
 The term cyberspace has become a conventional means to describe

anything associated with the Internet and t...
Threats in Cyberspace
1.

Hacktivism

2.

Cybercrime

3.

Cyber terrorism
Levels of Cyber
Terrorism:
Simple Un-Structured
Advanced –Structured
Complex coordinated
The Nature of the Internet:
Strength and Weaknesses
• Redundancy

• Flaws

• Wireless

• Reliance on private

• Vulnerabil...
Cyber security
Complex security risks and challenges.
Limiting the risk to data before attacks occur is

accomplished th...
Solutions:
We provide the following
ProActive&ReActivetechniqs :
Peventive safety measures to tackle cyber attacks,

setti...
Area Of Research
Cyber Terrorism
Advantages:
•Using Cyber Warfare we can obtain critical information on
our enemies.
•New job opportunities in the IT world...
Conclusion:
o

Capacity of human mind is unfathomable. It is not possible to
eliminate cyber crime from the cyber space. I...
ha
T

ou
kY
n
Cyber War 1st Prize
Upcoming SlideShare
Loading in...5
×

Cyber War 1st Prize

268
-1

Published on

we did this presentation very well and got gud commands...
Especially NO QURIES........... :-)

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
268
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber War 1st Prize

  1. 1. NANDHA ENGINEERING COLLEGE ERODE-52
  2. 2. CYBER WAR-A NEW FACE OF TERRORISM Guided by E.Kanimozhi ,M.E AP/Dept of IT PRESENTED BY S.INDHUJA G.KEERTHANA PREETHI
  3. 3. Objective: Revenge Politics Protest Disrupt the activities of an enemy country
  4. 4. CYBER WAR The use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems.
  5. 5. Cyberterrorism Definition 1. Political agenda 2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3. Civilians as targets 4. Publicity 5. Non-state actors Traditional Terrorism definition: • Use of violence
  6. 6. Cyber Terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. 
  7. 7.  Cyber terrorism can be also defined as the intentional use of computer networks, and public internet to cause destruction and harm for personal objectives . Objectives may be political or ideological since this is a form of terrorism.
  8. 8. Attack Targets Cell phone worms. Rootkits. Trojans. Spreading virus via trojans.
  9. 9. Distributed denial-of-service attack (DDoS) A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.   The flood of incoming messages to the target system essentially forces it to shut down. Types: Network centric attack (bandwidth) Application layer attack(app., calls)
  10. 10. Cyberspace:  The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. Amongst individuals on cyberspace, there is believed to be a code of shared rules and ethics mutually beneficial for all to follow, referred to as cyberethics. 
  11. 11. Threats in Cyberspace 1. Hacktivism 2. Cybercrime 3. Cyber terrorism
  12. 12. Levels of Cyber Terrorism: Simple Un-Structured Advanced –Structured Complex coordinated
  13. 13. The Nature of the Internet: Strength and Weaknesses • Redundancy • Flaws • Wireless • Reliance on private • Vulnerabilities and flaws can be corrected sector
  14. 14. Cyber security Complex security risks and challenges. Limiting the risk to data before attacks occur is accomplished through risk assessment &management.
  15. 15. Solutions: We provide the following ProActive&ReActivetechniqs : Peventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and other crash courses.
  16. 16. Area Of Research Cyber Terrorism
  17. 17. Advantages: •Using Cyber Warfare we can obtain critical information on our enemies. •New job opportunities in the IT world in this field, especially for military Disadvantages: •We need to be very careful how and were we put data on the web. •The US is attacked millions of times daily. •If someone were to break through our cyber security it could have a huge impact. •It could take hours to days to fix a breach in security.
  18. 18. Conclusion: o Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. o The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. http://mutex.gmu.edu:2048/login?url=http://
  19. 19. ha T ou kY n
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×