Cyberterrorism final


Published on

Complete description about cyberterrorism....!

Published in: Technology, News & Politics
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The preceding case studies show a direct relationship between political conflicts and increased cyber attack activity. Further, they highlight that this malicious cyber activity can have concrete political and economic consequences. In the Israel/Palestinian conflict, following events such as car bombings and mortar shellings, there were increases in the number of cyber attacks. Subsequent to the April 1, 2001 mid-air collision between an American surveillance plane and a Chinese fighter aircraft, Chinese hacker groups immediately organized a massive and sustained week-long campaign of cyber attacks against American targets.
  • Extensive use of the Internet for research and communication shows why terrorists are likely to be attracted to Information Technology While society today has yet to experience an instance of cyberterrorism, cyber attacks by terrorists will likely occur in the future. This potential threat will require continued vigilance to reevaluate indicators of this type of activity as a more technically competent generation emerges and as we anticipate there will be more substantial cyber threats in the future.
  • Cyberterrorism final

    2. 2. Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
    3. 3. <ul><li>Cyber Terrorism </li></ul>India Cornwall
    4. 4. Background Information <ul><li>Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and uncertainty about the  millennium bug heightened and interest in potential cyber terrorist attacks also increased . </li></ul>
    5. 5. What Do We Know? <ul><li>Cyber attacks immediately follow physical attacks </li></ul><ul><li>Cyber attacks are increasing in volume, sophistication, and coordination </li></ul><ul><li>Cyber attackers are attracted to high-value targets </li></ul><ul><li>Many, if not most, targets would probably be commercial computer and communications systems </li></ul>
    6. 6. <ul><li>Effects of cyber terrorism. </li></ul><ul><li>Cyber terrorism in past. </li></ul><ul><li>Cyber terrorism in future. </li></ul>
    7. 7. Model train controlled via brain-machine interface. --By Hitachi using optical Topography
    8. 8. BCI :Brain Computer Interface
    9. 9. “ Sample Nuclear Launch While Under Cyber Attack” <ul><li>[yes, this is a doctored photo, used here just to lighten a serious moment] </li></ul><ul><li>Source: </li></ul>
    10. 10. What Can We Do? <ul><li>Go on the defensive now </li></ul><ul><ul><li>Educate senior management on risks of cyberwarfare </li></ul></ul><ul><ul><li>Make infosec a top priority </li></ul></ul><ul><ul><li>Beef up your security technology </li></ul></ul><ul><ul><li>Insist on flawless execution: compliance to security standards in all areas </li></ul></ul><ul><li>Work with other companies, government agencies </li></ul><ul><ul><li>NIPC </li></ul></ul><ul><ul><li>IT ISAC </li></ul></ul><ul><ul><li>SAINT </li></ul></ul>
    11. 11. What can be done to prevent an electronic terrorist attack? <ul><ul><ul><li>Effective use of intelligence gathered from all sources </li></ul></ul></ul><ul><ul><ul><li>Continued enhancement of resources </li></ul></ul></ul><ul><ul><ul><li>Public/Private interaction </li></ul></ul></ul><ul><ul><ul><li>Computer security and awareness training </li></ul></ul></ul><ul><ul><ul><li>Continuing education regarding terrorist trends and methodologies </li></ul></ul></ul><ul><ul><ul><li>Perpetual readiness to defend against attacks </li></ul></ul></ul>
    12. 12. Some Specifics: Be Prepared <ul><li>Maintain high alert & vigilance </li></ul><ul><li>Update OS and applications regularly </li></ul><ul><li>Enforce strong passwords </li></ul><ul><li>“Lock down&quot; systems </li></ul><ul><li>Keep anti-virus software installed and up-to-date </li></ul><ul><li>Employ intrusion detection systems and firewalls </li></ul>
    13. 13. Cyber Division FBI Headquarters Department of Homeland Security Transition Computer Intrusion Section Cyber Investigations Branch Deputy Assistant Director Assistant Director Cyber Crime Section Outreach, Capability and Development Section National Infrastructure Protection Center Analysis and Warning Section Outreach, Training and Strategy Section Special Assistant Operational Support Staff Special Technologies And Applications Section
    14. 14. Cyber Investigations Branch
    15. 15. Where Can I Find Out More? <ul><li>Symantec White Paper on Cyber Terrorism by Sarah Gordon http:// </li></ul><ul><li>Australian Government Institute of Criminology: http:// </li></ul><ul><li>IWS - The Information Warfare Site http:// </li></ul><ul><li>Dorothy E. Denning's Website http:// / </li></ul>
    16. 16. Queries ??
    17. 17. <ul><li>Thank you ! </li></ul>