0
1Cyber Threats
   At the end of this lesson, the student should be able    to:     Define cyberterrorism and cyberwarfare;     Identif...
“The use of computer networks to shut down critical   infrastructure (such as energy, transportation,  government operatio...
   Information war     “The use of computers and other devices to       attack an enemy’s information systems as      opp...
   Trojan Horse: A computer program that conceals    harmful code. A Trojan horse usually masquerades as    a useful prog...
   Phishing: Using emails and websites designed to look    like those of legitimate businesses/government    agencies to ...
   Distributed Denial of Service (DDoS): A    variant of the DoS attack that uses a    coordinated attack from a distribu...
Titan Rain (2003+) Series of coordinated attacks on US  computers Thought to be Chinese in origin NASA, Lockheed Martin...
Estonia, April 2007 DDoS attack against Estonian  banks, media and government Coincided with major civil unrest  by Russ...
GhostNet Chinese cyberespionage network At least 103 countries penetrated Searches computers and emails, then turns  on...
Cyber Threats   11
   Created in 2006   Housed within DHS   “responsible for enhancing the security,    resiliency, and reliability of the...
   Created in June 2009   Began operations in May 2010   Part of the US Strategic Command, involving    military units ...
Plans, coordinates, integrates,synchronizes and conductsactivities to: Direct the operations and defense of    specified ...
   Spy Museum Interviews: http://spymuseum.org/from-    spy/spycast     November 1, 2009 interview features Melissa Hath...
Upcoming SlideShare
Loading in...5
×

Cyber threats

1,080

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,080
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
61
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Cyber threats"

  1. 1. 1Cyber Threats
  2. 2.  At the end of this lesson, the student should be able to:  Define cyberterrorism and cyberwarfare;  Identify five types of cyber attacks and understand the damage that cyber attacks can inflict;  Discuss several recent examples of cyber attacks;  Identify and explain the roles of two organizations involved in defending US cyberspace. Counterintelligence 2
  3. 3. “The use of computer networks to shut down critical infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Source: Center for Strategic and International Studies) Cyber Threats 3
  4. 4.  Information war “The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories.” (Source: American Heritage New Dictionary) Cyber Threats 4
  5. 5.  Trojan Horse: A computer program that conceals harmful code. A Trojan horse usually masquerades as a useful program that a user would wish to execute. Virus: A program that infects computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to affect other files. Unlike a computer worm, a virus requires human involvement (usually unwitting) to propagate. Cyber Threats 5
  6. 6.  Phishing: Using emails and websites designed to look like those of legitimate businesses/government agencies to deceive internet users into disclosing personal data, e.g. bank and financial account information and passwords. DoS (Denial of Service): A method of attack from a single source that denise system access to legitimate users by overwhelming the target computer with messages and blocking legitimate traffic. It can prevent a system from being able to exchange data with other systems of use the internet. Cyber Threats 6
  7. 7.  Distributed Denial of Service (DDoS): A variant of the DoS attack that uses a coordinated attack from a distributed system of computers rather than from a single source. It often makes use of worms to spread to multiple computers that can then attack the target. Counterintelligence 7
  8. 8. Titan Rain (2003+) Series of coordinated attacks on US computers Thought to be Chinese in origin NASA, Lockheed Martin, and other vital organizations penetrated Counterintelligence 8
  9. 9. Estonia, April 2007 DDoS attack against Estonian banks, media and government Coincided with major civil unrest by Russian nationals Cyber Threats 9
  10. 10. GhostNet Chinese cyberespionage network At least 103 countries penetrated Searches computers and emails, then turns on webcams and microphones to record any conversations within range Counterintelligence 10
  11. 11. Cyber Threats 11
  12. 12.  Created in 2006 Housed within DHS “responsible for enhancing the security, resiliency, and reliability of the nations cyber and communications infrastructure” Counterintelligence 12
  13. 13.  Created in June 2009 Began operations in May 2010 Part of the US Strategic Command, involving military units from the US Army, Navy, Air Force and Marines Directed by General Keith B. Alexander (also head of NSA) Cyber Threats 13
  14. 14. Plans, coordinates, integrates,synchronizes and conductsactivities to: Direct the operations and defense of specified DoD information networks Prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.Counterintelligence 14
  15. 15.  Spy Museum Interviews: http://spymuseum.org/from- spy/spycast  November 1, 2009 interview features Melissa Hathaway, former senior director for cyberspace for the National Security Council  June 15, 2009 interview features Dr. Terry Gudaitis, former CIA operations officer and president of cyber intelligence company Cyveillance www.DHS.gov/Cyber } for more on securing www.OnGuardOnline.gov } shared cyber networks Cyber Threats 15
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×