SlideShare a Scribd company logo
1 of 9
Cyber Terrorism:
An Introduction-
In the modern digital world, cyber terrorism is emerging as a major threat to security of
Information.
CYBER TERRORISM
Cyber term is used to relate all
aspects of computing. e.g.
storing ,protecting data.
The unlawful use of violence and
intimidation in the pursuit of
political ,organizational and
financial aims.
Cyber terrorism is the act of using digital knowledge to achieve the political,
organizational or financial goals by threatening and harming the civilians or
government.
Major Cyber Attacks
Across the World
1.Robert Tappan Morris and the Morris Worm(1988)
The first computer worm was created and transmitted through internet by
Morris, a student of cornell university(USA).
2.Google China hit by Cyber attack(2009)
Chinese Government Hackers gained access to several Google’s corporate
servers and intellectual property was stolen.
3.Teen Hacks NASA and US Defense Department(1999)
Jonathan James(15) , penetrate the computers of US department of
defense division and installed a backdoor on its servers.
Major Cyber Attacks
In India
According to EY’s latest global information Security Survey(GISS,2018-19) –India
Edition, One of the highest number of cyber threats have been detected in India and
the country ranks 2nd in terms of cyber-Targeted attacks.
Banking and Telecom are the most attacked sectors.
1.Cosmos Bank Cyber Attack in Pune(2018)
This daring attack shook the whole banking sector of India, when hackers siphoned
off Rs.94.42 crores from Cosmos Cooperative Bank Ltd. In Pune.
2.ATM system hacked (2018)
Canera bank ATM servers were targeted in cyber attack .20 lakhs rupees were
wiped off from various bank accounts.
3.UIDAI Aadhaar Software Hacked(2018)
Massive Data Breech of personal records of 1.1 Billion Indian Aadhaar Card
Holders.
4.SIM Swap Scam
Two hackers from Navi Mumbai Transferred 4 crore from several bank accounts.
5.WannaCry(2017)
It is a ransomware attack in five big cities of India.
6.Mirai Botnet
It is malware that infects smart devices that run on ARC processors.
Motives Behind Cyber Attack
1.To seek commercial gain by hacking banks and financial institutions.
2.To Attack critical assets of a nation.
3.To penetrate both corporate and military data Servers to obtain plans and intelligence.
4.To hack sites to virally communicate a message for some specific campaign related to
politics and society.
5.To achieve information or money from a particular person as a target.
Types of Cyber Attacks-
1.Malware(Malicious Software)
Designed to cause damage to single computer or server.
e.g., Ransomware, Spyware, Worms , Viruses and trojans.
2.Phishing
It is method of trying to gather personal information Using deceptive e-mails and
websites.
3.Denial of service attacks-A DoS attack is an attack meant to shut down a machine
or network making it inaccessible to its intended users.
4.Man in the Middle Attack(MITM Attack)
5.SQL injection(structured query language)-It targets the servers that stores critical
data for websites.
6.Cross Site Scripting(XSS)-It injects malicious code into a website but in this case,
website itself is not being attacked.
7.Social Engineering-It is an attack that relies on human interaction to trick users
into breaking security procedures to gain sensitive information that is typically
protected.
Need for Countering Cyber Terrorism
1.For individuals -inappropriate use of personal information shared
on social networking sites leading to serious and even life-threatening
incidents
2.For business organizations- A cyber attack may lead to loss of
private data ,competitive info. Resulting into complete loss of public
trust on integrity of organization
3.For govt.-government’s data such as geographical military strategic
asset can be stolen by a cyber attack.
Combating cyber terrorism
1. Awareness and training
2. Keep your Software and system fully up-to-date
3. Ensure End Point Protection through Software
4. Install a firewall
5. Back-up your data
6. Control Access to your System
7. Wi-Fi Security
8. Access Management and password.
Our Responsibility As a Civilian to Counter Cyber
Terrorism
1. Use a full-service internet security suite.
2. Use strong password .
3. Keep your software updated
4. Manage your social media settings.
5. Strengthen your home network.
6. Keep up to date on major security breaches.
7. Take measures o help protect yourself against identity thefts.

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
cyber security
cyber security cyber security
cyber security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 

Similar to Cyber terrorism

Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
anjanaarts2014
 

Similar to Cyber terrorism (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
C018131821
C018131821C018131821
C018131821
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Delivery in 20 Mins Call Girls Cuttack 9332606886 HOT & SEXY Models beautifu...
Delivery in 20 Mins Call Girls Cuttack  9332606886 HOT & SEXY Models beautifu...Delivery in 20 Mins Call Girls Cuttack  9332606886 HOT & SEXY Models beautifu...
Delivery in 20 Mins Call Girls Cuttack 9332606886 HOT & SEXY Models beautifu...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Mehdipatnam ( 8250092165 ) Cheap rates call girls | Get low budget
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 

Cyber terrorism

  • 1. Cyber Terrorism: An Introduction- In the modern digital world, cyber terrorism is emerging as a major threat to security of Information. CYBER TERRORISM Cyber term is used to relate all aspects of computing. e.g. storing ,protecting data. The unlawful use of violence and intimidation in the pursuit of political ,organizational and financial aims. Cyber terrorism is the act of using digital knowledge to achieve the political, organizational or financial goals by threatening and harming the civilians or government.
  • 2. Major Cyber Attacks Across the World 1.Robert Tappan Morris and the Morris Worm(1988) The first computer worm was created and transmitted through internet by Morris, a student of cornell university(USA). 2.Google China hit by Cyber attack(2009) Chinese Government Hackers gained access to several Google’s corporate servers and intellectual property was stolen. 3.Teen Hacks NASA and US Defense Department(1999) Jonathan James(15) , penetrate the computers of US department of defense division and installed a backdoor on its servers.
  • 3. Major Cyber Attacks In India According to EY’s latest global information Security Survey(GISS,2018-19) –India Edition, One of the highest number of cyber threats have been detected in India and the country ranks 2nd in terms of cyber-Targeted attacks. Banking and Telecom are the most attacked sectors. 1.Cosmos Bank Cyber Attack in Pune(2018) This daring attack shook the whole banking sector of India, when hackers siphoned off Rs.94.42 crores from Cosmos Cooperative Bank Ltd. In Pune.
  • 4. 2.ATM system hacked (2018) Canera bank ATM servers were targeted in cyber attack .20 lakhs rupees were wiped off from various bank accounts. 3.UIDAI Aadhaar Software Hacked(2018) Massive Data Breech of personal records of 1.1 Billion Indian Aadhaar Card Holders.
  • 5. 4.SIM Swap Scam Two hackers from Navi Mumbai Transferred 4 crore from several bank accounts. 5.WannaCry(2017) It is a ransomware attack in five big cities of India. 6.Mirai Botnet It is malware that infects smart devices that run on ARC processors. Motives Behind Cyber Attack 1.To seek commercial gain by hacking banks and financial institutions. 2.To Attack critical assets of a nation. 3.To penetrate both corporate and military data Servers to obtain plans and intelligence. 4.To hack sites to virally communicate a message for some specific campaign related to politics and society. 5.To achieve information or money from a particular person as a target. Types of Cyber Attacks- 1.Malware(Malicious Software) Designed to cause damage to single computer or server. e.g., Ransomware, Spyware, Worms , Viruses and trojans. 2.Phishing It is method of trying to gather personal information Using deceptive e-mails and websites.
  • 6. 3.Denial of service attacks-A DoS attack is an attack meant to shut down a machine or network making it inaccessible to its intended users. 4.Man in the Middle Attack(MITM Attack) 5.SQL injection(structured query language)-It targets the servers that stores critical data for websites. 6.Cross Site Scripting(XSS)-It injects malicious code into a website but in this case, website itself is not being attacked. 7.Social Engineering-It is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected.
  • 7. Need for Countering Cyber Terrorism 1.For individuals -inappropriate use of personal information shared on social networking sites leading to serious and even life-threatening incidents 2.For business organizations- A cyber attack may lead to loss of private data ,competitive info. Resulting into complete loss of public trust on integrity of organization 3.For govt.-government’s data such as geographical military strategic asset can be stolen by a cyber attack.
  • 8. Combating cyber terrorism 1. Awareness and training 2. Keep your Software and system fully up-to-date 3. Ensure End Point Protection through Software 4. Install a firewall 5. Back-up your data 6. Control Access to your System 7. Wi-Fi Security 8. Access Management and password.
  • 9. Our Responsibility As a Civilian to Counter Cyber Terrorism 1. Use a full-service internet security suite. 2. Use strong password . 3. Keep your software updated 4. Manage your social media settings. 5. Strengthen your home network. 6. Keep up to date on major security breaches. 7. Take measures o help protect yourself against identity thefts.