Cyber terrorism power point

11,825 views

Published on

Published in: Technology
0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
11,825
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
636
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

Cyber terrorism power point

  1. 1. By: Jessica McLain<br />
  2. 2. What’s The Definition Exactly?<br /> The word CyberTerrorism can vary greatly on meaning. The word can mean the taking over of something small or something that is serious like our military systems or Homeland Security. The computer and Internet is the key to succeeding here. Most people would define this as a terrorist attack over the Internet from country to country, but it can also mean an attack on something smaller such as a single person’s identity. <br />
  3. 3. The Always Prying Eyes of the Destructive<br />Do you know who is watching you when you type in your credit card or SSN on a website? Most people stereotype the people of the Muslim religion as “the common terrorist,” but are they truly the ones to watch in this situation? Or is China the most crucial enemy in the “cyber war?” <br />
  4. 4. Is the U.S.’s biggest vulnerability the fact that we always accuse our known enemy?<br />This is a common type of cyber terrorism clipart or cartoon. Maybe the gesture here is the group Al Qaeda is attempting to set up a cyber attack on the U.S. The author of this drawing is trying to suggest that the Muslim group has a lack of brains since the computer is unplugged, and the three men cannot read step by step directions from a book on how to hack. I believe this is one belief we need to step away from and rethink our most vital enemies at large.<br />
  5. 5. Is Al Qaeda Really The Problem?<br />The U.S. seems to perceive Al Qaeda as the main terrorist, and of course they are a known terror group, but are we really focusing on the true enemy here. China is becoming more and more powerful with each passing day, and the country appears to be attempting to take over the U.S. so that they will be the country considered to be the most powerful and influential. There is a lot at stake when applying delicate information to a computer so should we trust this “power hungry” nation? I believe our guard is slowly lowering to China which is not a good thing to our people’s freedom or our country’s well being.<br />
  6. 6. 10 Ways On How To Prevent Cyber Terrorism From Happening<br />Develop a strong password<br />Disable any application that seems unnecessary<br />Keep software up to date<br />Do not open mail attachments<br />Enact an anti-virus software<br />Maintain the accurate browser security settings<br />Compile strong firewalls<br />Weigh the relevance of convenience vs. security<br />Enable and enforce a strong policy in public places with other people<br />Recognize the most vital information and always keep it in the safest possible place<br />www.ferret.com.au/.../10-ways-to-prevent-cyberterrorism-n707725<br />
  7. 7. A Weapon Of Mass Destruction<br />Once considered a learning tool, the computer is now known as one weapon of mass destruction. Cyber Terrorists use this powerful tool to communicate with their group members, attack sensitive information, and broadcast their attacks or disagreements with the U.S.’s policies. This behavior should not be tolerated, but the government is finding that trying to control the attacks of it’s systems to be a losing battle. For one thing, the hackers are anonymous, and tracing their destinations are almost impossible.<br />http://www.terrorismcentral.com/Library/Teasers/vatis.html<br />
  8. 8. A Serious Threat Or Not?<br />Some people consider cyber terrorism as posing a serious threat, but does it actually cause that much chaos in the present time. In contrast, cyber terrorism may be a serious threat in the coming years due to the fact that all of our country is transferring to computer technology when it involves work or play. So much information is available to be seen that the cyber terrorists are too greedy to resist not trying to cause damage to delicate records or sensitive information. I predict cyber terrorism to become an ongoing war between our country and our country’s enemies.<br />
  9. 9.
  10. 10. Cyber Terrorism: The Next Battle<br />It is predicted by many for the cyber war to become global and ugly. The war would be virtually bloody and very damaging. The costs to repair the information altered or lost would probably cost millions which our country cannot afford. I think we should prepare for this war with knowledge and wit. Our enemy countries realize that attacking our military physically is not as affective than attacking our financial systems or military information systems. So will it be the first virtual battle to be experienced? Only time will tell if our government systems and military systems can withstand the enormous mass of destruction that will appear in the coming years.<br />

×