SlideShare a Scribd company logo
1 of 4
INFORAMTION ASSURANCES AND CYBER DEFENSE
                                       INTRODUCTION
It is not clear whether the Cyber-Terrorist is real or simply a theoretical class of adversary. Very
little intelligence or other data exist in open literature that characterizes the behavior or existence
of this class of adversary. We will argue that the Cyber-Terrorist is a very real potential threat to
modern information systems. Therefore, sophisticated defenders must understand the capabilities
and behavior of this adversary in order to defend against it. The Defense Advanced Research
Projects Agency‟s (DARPA‟s) Information Assurance (IA) Program is attempting .To
incorporate the Cyber-Terrorist Into a larger model of threats poised against information systems
operated by the US Department of Defense. This paper lists some of the basic assumptions about
this adversary, with the intent that these assumptions may be challenged within the research
community.
                                         HYPOTHESIS

Information systems that manage the nation‟s defenses and critical infrastructures are vulnerable
to cyber attacks.


                                 PROBLEM STATEMENT
             The problem of defending the nation from a cyber attack is complicated.
                               SIGNIFICANCE OF STUDY

The project is designed to develop conceptual and analytical understanding about the initiatives
that must be taken in order to secure the Cyber technology. This project helps me to understand
the objective to identify common threats and attacks employed against Web-accessible
applications. We analyze and explain the role of cryptography, and scrutinize issues related to
security management and network security.

                                      RESEARCH QUESTION



What is Cyber attack: Is your critical infrastructure is safe?
Is Anatomy of sophisticated IT is vulnerable to Cyber attack?
Is cyber attack is a threat not just to our national security, but also to our economic edge and way
of life?
Are Cyber-attacks on critical infrastructure representing a threat to both governments and the
private sector?
Should the National Guard and reserve members‟ role be expended to support cyberspace roles
and functions?




                                        LITERATURE REVIEW


In article (2009)“IATAC’s Critical Role in Information Assurance and Cyber
Security “by Gene Tyler, Dr. Ron Ritchey, and Karen Mercedes Goertzel
Authors analyzed the Measuring Cyber Security and Information Assurance which provides a
broad picture of the current stat e of cyber security and information assurance, as well as a
comprehensive look at the progress made in measurement discipline. The security of our nation
depends on the survivability, authenticity, and continuity of information systems. These systems
are vulnerable to external attacks, due in part to the necessary dependence on commercial
systems and the increased use of the Internet. Security of information systems is also of supreme
importance to the war fighter in defending our national security.
With the increasing amount of concern and Information Warfare (IW) activities requiring rapid
responses, it is difficult to ensure that all appropriate agencies and organizations are given the
knowledge and tools to protect from, react to, and defend against IW attacks. The Information
Assurance Technology Analysis Center (IATAC) is institution for facilitating the sharing of
Information Assurance (IA) and cyber security information throughout government, industry,
and academia so that individuals can gain access to knowledge and tools essential for effective
computer network defense.
In book “CYBER SECURITY ESSENTIALS” had written by Rick Howard, James J. Graham,
Richard Howard 15 dec, (2010). The book then essentially provides an „introduction‟ to the „subject‟
of Cyber Security. It covers the main concepts involved in identifying potential threats, vulnerabilities and
the procedures necessary to combat them, but does not provide a comprehensive, detailed description on
the subject of Cyber Security.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work.
Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts
behind prevalent threats, tactics, and procedures.


The subject content does provide an overview of current threats and trends, which, as outlined above, are
broken down and explained in simple terms, including the issue of program code exploits (reasonable
details provided on this). Diagrams are used well, enhancing the reader‟s understanding of the subject
matter and relevant references are provided where necessary.

Cyber Security, by its very nature, tends to be technical, and explaining technical concepts to the business
can often be challenging. This book aims to help in this area by removing the technical jargon as far as
possible and substituting these with simple terms to explain technical aspects. Does it work? Well,
almost; like many other complicated subjects where the author tries to make the topics accessible to the
layman, some of the important stuff gets lost in translation! To accomplish this, the team of security professionals from
VeriSign‟s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those
new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff.
Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations,
exploitation trends, malicious code techniques, and the latest threat vectors


            Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical
             understanding
            Supplies actionable advice for the mitigation of threats
            Breaks down the code used to write exploits into understandable diagrams


This book is not about the latest attack trends or botnets. It‟s about the reasons why these problems continue to plague us. By better understanding the logic
presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the
threats and attacks on the horizon




                                             RESEARCH METHODOLOGY
Researchers use secondary data for this research project by applying the methodology of
descriptive and analytical research. Data was collected from different websites, books, and
newspaper articles. Additional research was pursued utilizing college and university websites
that posted studies of similar matters. Furthermore, books written by experts were examined and
relevant information was extracted to reinforce the views within this text. A logical analysis of
the material was conducted and presented in this paper.


                                                              LIMITATIONS
      1. Being female researcher it was for researchers to go outside for searching data.
      2. Time span was very limited for dealing with such a complex and recent topic.
      3. Lack of good literature available in Fatima Jinnah Women University.
TENTATIVE OUTLINE/STRUCTURE OF STUDY

             CHAPTER 1



             CHAPTER 2



             CHAPTER 3



             CHAPTER 4

             CHAPTER 5




              CONCLUSION

More Related Content

What's hot

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...PacificResearchPlatform
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learningPadmaSelvaraj4
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
Cyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCharles Li
 

What's hot (20)

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
CV
CVCV
CV
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learning
 
Deception towards Moving Target Defense
Deception towards Moving Target DefenseDeception towards Moving Target Defense
Deception towards Moving Target Defense
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Cyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive Era
 

Viewers also liked

T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.Madhav Vyas
 
2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applicationsudayudu
 
Evoluion of western diet chronic disease for cuny copy
Evoluion of western diet  chronic disease  for cuny copyEvoluion of western diet  chronic disease  for cuny copy
Evoluion of western diet chronic disease for cuny copynmaki
 
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho
 
03.04 power point
03.04 power point03.04 power point
03.04 power pointamyfwest
 

Viewers also liked (16)

T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.
 
El slides
El slidesEl slides
El slides
 
How To Create Killer Recruiting Content
How To Create Killer Recruiting ContentHow To Create Killer Recruiting Content
How To Create Killer Recruiting Content
 
Emotions. For kids
Emotions. For kidsEmotions. For kids
Emotions. For kids
 
2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications
 
Mis
MisMis
Mis
 
Sourcer's Daily Dozen - Glenn Gutmacher
Sourcer's Daily Dozen - Glenn GutmacherSourcer's Daily Dozen - Glenn Gutmacher
Sourcer's Daily Dozen - Glenn Gutmacher
 
Mimsism's 1 & 2
Mimsism's 1 & 2Mimsism's 1 & 2
Mimsism's 1 & 2
 
Coaching
CoachingCoaching
Coaching
 
skolskit
skolskitskolskit
skolskit
 
Evoluion of western diet chronic disease for cuny copy
Evoluion of western diet  chronic disease  for cuny copyEvoluion of western diet  chronic disease  for cuny copy
Evoluion of western diet chronic disease for cuny copy
 
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
 
Usb idazteko plantilla
Usb idazteko plantillaUsb idazteko plantilla
Usb idazteko plantilla
 
03.04 power point
03.04 power point03.04 power point
03.04 power point
 
Chủ đề 2
Chủ đề 2Chủ đề 2
Chủ đề 2
 
Pjk akhir tahun
Pjk akhir tahunPjk akhir tahun
Pjk akhir tahun
 

Similar to Cyber terrorism.. sir summar

Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingOluseyi Akindeinde
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Maurice Dawson
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmapAjay Ohri
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxbkbk37
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxstudywriters
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceJacklynTsai
 

Similar to Cyber terrorism.. sir summar (20)

Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_Modeling
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
Internet Safety Essay.pdf
Internet Safety Essay.pdfInternet Safety Essay.pdf
Internet Safety Essay.pdf
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat Intelligence
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Cyber terrorism.. sir summar

  • 1. INFORAMTION ASSURANCES AND CYBER DEFENSE INTRODUCTION It is not clear whether the Cyber-Terrorist is real or simply a theoretical class of adversary. Very little intelligence or other data exist in open literature that characterizes the behavior or existence of this class of adversary. We will argue that the Cyber-Terrorist is a very real potential threat to modern information systems. Therefore, sophisticated defenders must understand the capabilities and behavior of this adversary in order to defend against it. The Defense Advanced Research Projects Agency‟s (DARPA‟s) Information Assurance (IA) Program is attempting .To incorporate the Cyber-Terrorist Into a larger model of threats poised against information systems operated by the US Department of Defense. This paper lists some of the basic assumptions about this adversary, with the intent that these assumptions may be challenged within the research community. HYPOTHESIS Information systems that manage the nation‟s defenses and critical infrastructures are vulnerable to cyber attacks. PROBLEM STATEMENT The problem of defending the nation from a cyber attack is complicated. SIGNIFICANCE OF STUDY The project is designed to develop conceptual and analytical understanding about the initiatives that must be taken in order to secure the Cyber technology. This project helps me to understand the objective to identify common threats and attacks employed against Web-accessible applications. We analyze and explain the role of cryptography, and scrutinize issues related to security management and network security. RESEARCH QUESTION What is Cyber attack: Is your critical infrastructure is safe?
  • 2. Is Anatomy of sophisticated IT is vulnerable to Cyber attack? Is cyber attack is a threat not just to our national security, but also to our economic edge and way of life? Are Cyber-attacks on critical infrastructure representing a threat to both governments and the private sector? Should the National Guard and reserve members‟ role be expended to support cyberspace roles and functions? LITERATURE REVIEW In article (2009)“IATAC’s Critical Role in Information Assurance and Cyber Security “by Gene Tyler, Dr. Ron Ritchey, and Karen Mercedes Goertzel Authors analyzed the Measuring Cyber Security and Information Assurance which provides a broad picture of the current stat e of cyber security and information assurance, as well as a comprehensive look at the progress made in measurement discipline. The security of our nation depends on the survivability, authenticity, and continuity of information systems. These systems are vulnerable to external attacks, due in part to the necessary dependence on commercial systems and the increased use of the Internet. Security of information systems is also of supreme importance to the war fighter in defending our national security. With the increasing amount of concern and Information Warfare (IW) activities requiring rapid responses, it is difficult to ensure that all appropriate agencies and organizations are given the knowledge and tools to protect from, react to, and defend against IW attacks. The Information Assurance Technology Analysis Center (IATAC) is institution for facilitating the sharing of Information Assurance (IA) and cyber security information throughout government, industry, and academia so that individuals can gain access to knowledge and tools essential for effective computer network defense. In book “CYBER SECURITY ESSENTIALS” had written by Rick Howard, James J. Graham, Richard Howard 15 dec, (2010). The book then essentially provides an „introduction‟ to the „subject‟ of Cyber Security. It covers the main concepts involved in identifying potential threats, vulnerabilities and the procedures necessary to combat them, but does not provide a comprehensive, detailed description on the subject of Cyber Security.
  • 3. The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. The subject content does provide an overview of current threats and trends, which, as outlined above, are broken down and explained in simple terms, including the issue of program code exploits (reasonable details provided on this). Diagrams are used well, enhancing the reader‟s understanding of the subject matter and relevant references are provided where necessary. Cyber Security, by its very nature, tends to be technical, and explaining technical concepts to the business can often be challenging. This book aims to help in this area by removing the technical jargon as far as possible and substituting these with simple terms to explain technical aspects. Does it work? Well, almost; like many other complicated subjects where the author tries to make the topics accessible to the layman, some of the important stuff gets lost in translation! To accomplish this, the team of security professionals from VeriSign‟s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‟s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon RESEARCH METHODOLOGY Researchers use secondary data for this research project by applying the methodology of descriptive and analytical research. Data was collected from different websites, books, and newspaper articles. Additional research was pursued utilizing college and university websites that posted studies of similar matters. Furthermore, books written by experts were examined and relevant information was extracted to reinforce the views within this text. A logical analysis of the material was conducted and presented in this paper. LIMITATIONS 1. Being female researcher it was for researchers to go outside for searching data. 2. Time span was very limited for dealing with such a complex and recent topic. 3. Lack of good literature available in Fatima Jinnah Women University.
  • 4. TENTATIVE OUTLINE/STRUCTURE OF STUDY CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 CONCLUSION