Cyber Terrorism

32,644 views

Published on

Team 3

4 Comments
16 Likes
Statistics
Notes
No Downloads
Views
Total views
32,644
On SlideShare
0
From Embeds
0
Number of Embeds
8,151
Actions
Shares
0
Downloads
1,674
Comments
4
Likes
16
Embeds 0
No embeds

No notes for slide

Cyber Terrorism

  1. 1. Cyber Terrorism <br />Presented By:<br />Theresa, Doug & James<br />
  2. 2. CONTENTS<br />Title Page<br />Content Page<br />Definition of Cyber Terrorism<br />A New Era<br />Evolution of Terrorism <br />Background Information<br />Effects of Cyber Terrorism<br />History & Examples of Cyber Terrorism<br />Countering Cyber Terrorism<br />
  3. 3. Definition of Cyber Terrorism<br />The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate a person in furtherance of such objectives.<br />
  4. 4. A New Era is arising and within the past couple of years the United States and the rest of the World has been challenged with new tactics that have never been used or seen before. <br />
  5. 5. Terrorism has evolved into an act that is not only unpredictable but is now able to affect us from all Terrorism is the new terrorism that can affect not only affects us physically and mentally, but financially and emotionally as well.<br />
  6. 6. Background Info on Cyber Terrorism<br />Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and uncertainty about the millennium bug heightened and interest in potential cyber terrorist attacks also increased.” We all remember when the year 2000 was near and the craze that began over what computers would and would not do. Even the government was worried about national security during this time.<br />
  7. 7. Effects of Cyber Terrorism<br />Cyber terrorism can cause: <br /><ul><li>Devastating effects on a nation, because critical infrastructures continue to become more reliant on computer networks for their operation.
  8. 8. Significant problems for national security and public policy that hasn't been dealt with in the past. If we don't step up security measures for computer networks, then cyber terrorism may become a useful tool for terrorist organizations to disrupt or possibly even shut down critical functions of that network.</li></li></ul><li>Effects of Cyber Terrorism Continued:<br />key critical infrastructures <br />Electric Power System- The electrical power grid is a probable target for cyber terrorists.If the computer systems controlling these systems could be disrupted or shut down it could knock out power for many. This could lead to potential deaths if the system isn&apos;t recovered in a timely manner.<br />
  9. 9. EffectsofCyberTerrorismContinued:<br />Water Supply System- <br />Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water<br />
  10. 10. Effects of Cyber Terrorism <br /> Continued:<br />Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights. <br />-911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.<br />
  11. 11. Effects of Cyber Terrorism <br /> Continued:<br />Healthcare Infrastructure- Now that most healthcare systems rely on the Internet cyber terrorism could potentially affect the healthcare facilities of a nation. Computerized medical, pharmacy, or health insurance records could be erased or altered<br />
  12. 12. Effects of Cyber Terrorism <br /> Continued:<br />While all of these examples of critical infrastructure are just hypothetical, cyber terrorism is a real threat that we should deal with now rather than later when it&apos;s too late. Although no cyber terrorist attacks have happened yet, the risk of groups such as Al Qaeda using cyber terrorism is there. Some believe that cyber terrorism isn&apos;t an option for terrorists because it doesn&apos;t cause the physical damage, nor does it put fear in people, such as a bomb or other physical attack. Many others believe that terrorists would most likely use cyber terrorism as a &quot;force multiplier&quot; for a physical attack following it.If this is the case, the effects could be devastating if terrorists found a way to knock out power, water, telecommunications, and other critical infrastructure just before another large scale attack such as 9/11.<br />
  13. 13. History/Background<br />1997:<br />The Electronic Disturbance Theater (EDT) starts conducting Web &quot;sit-ins&quot; against various domains in support of the Zapatistas of Mexico. Thousands of protesters point their browser at a site using software that overloads the site with requests for downloads<br />
  14. 14. History/Background<br /> 1997:<br />Chaos Computer Club creates ActiveX Controls that trick Quicken into removing money from a user&apos;s account and transferring it someplace else.<br />
  15. 15. History/Background<br />1998:<br />Ethnic Tamil guerrillas swamped Sri Lanken embassies with over 800 e-mails a day for more than two weeks. Some say this was the first known attack by terrorists against a country&apos;s IT infrastructure. <br />
  16. 16. History/Background<br />1999:NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo.<br />1999:Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours<br />
  17. 17. History/Background<br />2001: After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights. With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer<br />
  18. 18. Countering Cyber Terrorism<br />Because of this need the International Multilateral Partnership Against Cyber Threats (IMPACT) was formed. <br />-IMPACT is the first global public-private initiative against cyber-terrorism.<br />-IMPACT is dedicated to bringing together governments, industry leaders and Cyber Security experts to enhance the global community’s capacity to prevent, defend and respond to Cyber Threats.<br />-IMPACT’s global HQ facility is located in Cyberjaya, Malaysia<br />
  19. 19. Countering Cyber Terrorism<br />It’s extensive infrastructure contains training rooms, computer labs, auditorium, well-equipped meeting facilities and administrative offices. <br />-IMPACT acts as the foremost Cyber Threat resource center for the global community complete with an emergency response center to facilitate swift identification and sharing of available resources to assist member-governments during emergencies.<br />-IMPACT’s role also includes establishing a comprehensive Early Warning System for the benefit of all member-countries and providing proactive protection across the globe.<br />
  20. 20. Countering Cyber Terrorism<br />The Department of Defense charged the United States Strategic Command with the duty of combating cyber terrorism. <br /> <br />Countering attacks is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.<br />
  21. 21. Countering Cyber Terrorism<br />Many issues are involved when dealing with countering cyber terrorism. For example, some people believe that their privacy and civil rights are at stake.<br /> The question is:<br />What’s more important our privacy or our protection?<br />
  22. 22. EAGLE EYE 2008<br />The &quot;technology is everywhere&quot; idea for &quot;Eagle Eye&quot; was hatched several <br />years ago from the brilliant mind of executive producer Steven Spielberg. <br />He wanted to do for electronic devices what he successfully did for sharks <br />in &quot;Jaws.&quot; People feared going to the water after watching Spielberg&apos;s 1975 masterpiece but I doubt they will stop using technology because of &quot;Eagle Eye.&quot; <br />
  23. 23. LIVE FREE OR DIE HARD<br />Thomas Gabriel is a talented computer hacker who was once a top expert for the National Security Agency, but was fired and his reputation smeared for trying to warn his superiors about the country&apos;s vulnerability to cyber attack. He has contacted a number of hackers across the United States, paying them handsomely to write code. However, after they have delivered their code, they are killed by a team of assassins sent by Mai, Gabriel&apos;s girlfriend.<br />
  24. 24. Conclusion<br />It is impossible to ignore the fact of how extreme Cyber Terrorism can and will be in the future to come.<br />Cyber Terrorism may be more preventable then actual physical attacks on cities, civilians and other countries<br />
  25. 25. REFERENCES<br />wikipedia. (n.d.). Cyberterrorism. Retrieved July 3, 2009, from wikipedia.com: http://en.wikipedia.org/wiki/Cyberterrorism#Background_Information<br />.http://faculty.ist.psu.edu/bagby/Fall05/346F05T4/intro.html<br />http://www.youtube.com/watch?v=zCmJd6TI3w0<br />http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf<br />Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500<br />
  26. 26. REFERENCES<br />Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500<br />http://pdm.medicine.wisc.edu/18-3pdfs/272Clem.pdf<br />http://www.impact-alliane.org<br />Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, NJ & Columbus OH: Prentice Hall.<br />

×