SlideShare a Scribd company logo
1 of 26
Download to read offline
Cyber Terrorism ,[object Object],Presented By:,[object Object],Theresa, Doug & James,[object Object]
CONTENTS,[object Object],Title Page,[object Object],Content Page,[object Object],Definition of Cyber Terrorism,[object Object],A New Era,[object Object],Evolution of Terrorism ,[object Object],Background Information,[object Object],Effects of Cyber Terrorism,[object Object],History & Examples of Cyber Terrorism,[object Object],Countering Cyber Terrorism,[object Object]
Definition of Cyber Terrorism,[object Object],The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate a person in furtherance of such objectives.,[object Object]
A New Era is arising and within the past couple of years the United States and the rest of the World has been challenged with new tactics that have never been used or seen before. ,[object Object]
Terrorism has evolved into an act that is not only unpredictable but is now able to affect us from all   Terrorism is the new terrorism that can affect not only affects us physically and mentally, but financially and emotionally as well.,[object Object]
Background Info on Cyber Terrorism,[object Object],Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and uncertainty about the millennium bug heightened and interest in potential cyber terrorist attacks also increased.”  We all remember when the year 2000 was near and the craze that began over what computers would and would not do.  Even the government was worried about national security during this time.,[object Object]
Effects of Cyber Terrorism,[object Object],Cyber terrorism can cause: ,[object Object],[object Object]
 Significant problems for national security and public policy that hasn't been dealt with in the past. If we don't step up security measures for computer networks, then cyber terrorism may become a useful tool for terrorist organizations to disrupt or possibly even shut down critical functions of that network.,[object Object]
EffectsofCyberTerrorismContinued:,[object Object],Water Supply System- ,[object Object],Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water,[object Object]
Effects of Cyber Terrorism      		  ,[object Object],       Continued:,[object Object],Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights. ,[object Object],-911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.,[object Object]
Effects of Cyber Terrorism      		  ,[object Object],        Continued:,[object Object],Healthcare Infrastructure- Now that most healthcare systems rely on the Internet cyber terrorism could potentially affect the healthcare facilities of a nation. Computerized medical, pharmacy, or health insurance records could be erased or altered,[object Object]
Effects of Cyber Terrorism      		  ,[object Object],        Continued:,[object Object],While all of these examples of critical infrastructure are just hypothetical, cyber terrorism is a real threat that we should deal with now rather than later when it's too late. Although no cyber terrorist attacks have happened yet, the risk of groups such as Al Qaeda using cyber terrorism is there. Some believe that cyber terrorism isn't an option for terrorists because it doesn't cause the physical damage, nor does it put fear in people, such as a bomb or other physical attack. Many others believe that terrorists would most likely use cyber terrorism as a "force multiplier" for a physical attack following it.If this is the case, the effects could be devastating if terrorists found a way to knock out power, water, telecommunications, and other critical infrastructure just before another large scale attack such as 9/11.,[object Object]
History/Background,[object Object],1997:,[object Object],The Electronic Disturbance Theater (EDT) starts conducting Web "sit-ins" against various domains in support of the Zapatistas of Mexico. Thousands of protesters point their browser at a site using software that overloads the site with requests for downloads,[object Object]
History/Background,[object Object],	 1997:,[object Object],Chaos Computer Club creates ActiveX Controls that trick Quicken into removing money from a user's account and transferring it someplace else.,[object Object]
History/Background,[object Object],1998:,[object Object],Ethnic Tamil guerrillas swamped Sri Lanken embassies with over 800 e-mails a day for more than two weeks. Some say this was the first known attack by terrorists against a country's IT infrastructure. ,[object Object]
History/Background,[object Object],1999:NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo.,[object Object],1999:Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours,[object Object]
History/Background,[object Object],2001: After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights.  With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer,[object Object]
Countering Cyber Terrorism,[object Object],Because of this need the International Multilateral Partnership Against Cyber Threats (IMPACT) was formed. ,[object Object],-IMPACT  is the first global public-private initiative against cyber-terrorism.,[object Object],-IMPACT  is dedicated to bringing together governments, industry leaders and Cyber Security experts to enhance the global community’s capacity to prevent, defend and respond to Cyber Threats.,[object Object],-IMPACT’s global HQ facility is located in Cyberjaya, Malaysia,[object Object]
Countering Cyber Terrorism,[object Object],It’s extensive infrastructure contains training rooms, computer labs, auditorium, well-equipped meeting facilities and administrative offices. ,[object Object],-IMPACT acts as the foremost Cyber Threat resource center for the global community complete with an emergency response center to facilitate swift identification and sharing of available resources to assist member-governments during emergencies.,[object Object],-IMPACT’s role also includes establishing a comprehensive Early Warning System for the benefit of all member-countries and providing proactive protection across the globe.,[object Object]
Countering Cyber Terrorism,[object Object],The Department of Defense charged the United States Strategic Command with the duty of combating cyber terrorism. ,[object Object], ,[object Object],Countering attacks is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.,[object Object]
Countering Cyber Terrorism,[object Object],Many issues are involved when dealing with countering cyber terrorism. For example, some people believe that their privacy and civil rights are at stake.,[object Object], The question is:,[object Object],What’s more important our privacy or our protection?,[object Object]
EAGLE  EYE 2008,[object Object],The "technology is everywhere" idea for "Eagle Eye" was hatched several ,[object Object],years ago from the brilliant mind of executive producer Steven Spielberg. ,[object Object],He wanted to do for electronic devices what he successfully did for sharks ,[object Object],in "Jaws." People feared going to the water after watching Spielberg's 1975 masterpiece but I doubt they will stop using technology because of "Eagle Eye." ,[object Object]
LIVE FREE OR DIE HARD,[object Object],Thomas Gabriel is a talented computer hacker who was once a top expert for the National Security Agency, but was fired and his reputation smeared for trying to warn his superiors about the country's vulnerability to cyber attack. He has contacted a number of hackers across the United States, paying them handsomely to write code. However, after they have delivered their code, they are killed by a team of assassins sent by Mai, Gabriel's girlfriend.,[object Object]
Conclusion,[object Object],It is impossible to ignore the fact of how extreme Cyber Terrorism can and will be in the future to come.,[object Object],Cyber Terrorism may be more preventable then actual physical attacks on cities, civilians and other countries,[object Object]
REFERENCES,[object Object],wikipedia. (n.d.). Cyberterrorism. Retrieved July 3, 2009, from wikipedia.com: http://en.wikipedia.org/wiki/Cyberterrorism#Background_Information,[object Object],.http://faculty.ist.psu.edu/bagby/Fall05/346F05T4/intro.html,[object Object],http://www.youtube.com/watch?v=zCmJd6TI3w0,[object Object],http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf,[object Object],Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500,[object Object]
REFERENCES,[object Object],Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500,[object Object],http://pdm.medicine.wisc.edu/18-3pdfs/272Clem.pdf,[object Object],http://www.impact-alliane.org,[object Object],Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, NJ & Columbus OH: Prentice Hall.,[object Object]

More Related Content

What's hot

Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 

What's hot (20)

Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Optical Mark Recognition
Optical Mark RecognitionOptical Mark Recognition
Optical Mark RecognitionHimanshu Popli
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source softwareRob Jewitt
 
Search Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content SpamSearch Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content Spamjagadish thaker
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Search engines and its types
Search engines and its typesSearch engines and its types
Search engines and its typesNagarjuna Kalluru
 
The search engine index
The search engine indexThe search engine index
The search engine indexCJ Jenkins
 

Viewers also liked (9)

Parts of cpu
Parts of cpuParts of cpu
Parts of cpu
 
Optical Mark Recognition
Optical Mark RecognitionOptical Mark Recognition
Optical Mark Recognition
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
 
Search Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content SpamSearch Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content Spam
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Types of Search Engines
Types of Search EnginesTypes of Search Engines
Types of Search Engines
 
Search engines and its types
Search engines and its typesSearch engines and its types
Search engines and its types
 
The search engine index
The search engine indexThe search engine index
The search engine index
 

Similar to Cyber Terrorism

Cyber- Terrorism And Information Warfare
Cyber- Terrorism And Information WarfareCyber- Terrorism And Information Warfare
Cyber- Terrorism And Information WarfareHeather Dionne
 
Terrorist Cyber Attacks.pdfTerrorist Cyber Attacks
Terrorist Cyber Attacks.pdfTerrorist Cyber AttacksTerrorist Cyber Attacks.pdfTerrorist Cyber Attacks
Terrorist Cyber Attacks.pdfTerrorist Cyber AttacksClaudia Brown
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber-War And Cyber-Terrorism Defined
Cyber-War And Cyber-Terrorism DefinedCyber-War And Cyber-Terrorism Defined
Cyber-War And Cyber-Terrorism DefinedChristina Santos
 
Cyber Terrorism (FBI) Enforces Federal Laws
Cyber Terrorism (FBI) Enforces Federal LawsCyber Terrorism (FBI) Enforces Federal Laws
Cyber Terrorism (FBI) Enforces Federal LawsLaurie Gunlicks
 
Cyber Attacks And Physical Damage
Cyber Attacks And Physical DamageCyber Attacks And Physical Damage
Cyber Attacks And Physical DamageJessica Lopez
 
Military Advances The Private Sector
Military Advances The Private SectorMilitary Advances The Private Sector
Military Advances The Private SectorMelissa Williams
 
The Pros And Cons Of Communication Using The Internet
The Pros And Cons Of Communication Using The InternetThe Pros And Cons Of Communication Using The Internet
The Pros And Cons Of Communication Using The InternetDawn Rodriguez
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Governmental Support For Cyber Physical System Research
Governmental Support For Cyber Physical System ResearchGovernmental Support For Cyber Physical System Research
Governmental Support For Cyber Physical System ResearchMartha Malone
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 

Similar to Cyber Terrorism (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber- Terrorism And Information Warfare
Cyber- Terrorism And Information WarfareCyber- Terrorism And Information Warfare
Cyber- Terrorism And Information Warfare
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Terrorist Cyber Attacks.pdfTerrorist Cyber Attacks
Terrorist Cyber Attacks.pdfTerrorist Cyber AttacksTerrorist Cyber Attacks.pdfTerrorist Cyber Attacks
Terrorist Cyber Attacks.pdfTerrorist Cyber Attacks
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber-War And Cyber-Terrorism Defined
Cyber-War And Cyber-Terrorism DefinedCyber-War And Cyber-Terrorism Defined
Cyber-War And Cyber-Terrorism Defined
 
Cyber Terrorism (FBI) Enforces Federal Laws
Cyber Terrorism (FBI) Enforces Federal LawsCyber Terrorism (FBI) Enforces Federal Laws
Cyber Terrorism (FBI) Enforces Federal Laws
 
Cyber Attacks And Physical Damage
Cyber Attacks And Physical DamageCyber Attacks And Physical Damage
Cyber Attacks And Physical Damage
 
Military Advances The Private Sector
Military Advances The Private SectorMilitary Advances The Private Sector
Military Advances The Private Sector
 
The Pros And Cons Of Communication Using The Internet
The Pros And Cons Of Communication Using The InternetThe Pros And Cons Of Communication Using The Internet
The Pros And Cons Of Communication Using The Internet
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Governmental Support For Cyber Physical System Research
Governmental Support For Cyber Physical System ResearchGovernmental Support For Cyber Physical System Research
Governmental Support For Cyber Physical System Research
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 

Cyber Terrorism

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.