Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Cyber terrorism
1. Cyber Terrorism:
An Introduction-
In the modern digital world, cyber terrorism is emerging as a major threat to security of
Information.
CYBER TERRORISM
Cyber term is used to relate all
aspects of computing. e.g.
storing ,protecting data.
The unlawful use of violence and
intimidation in the pursuit of
political ,organizational and
financial aims.
Cyber terrorism is the act of using digital knowledge to achieve the political,
organizational or financial goals by threatening and harming the civilians or
government.
2. Major Cyber Attacks
Across the World
1.Robert Tappan Morris and the Morris Worm(1988)
The first computer worm was created and transmitted through internet by
Morris, a student of cornell university(USA).
2.Google China hit by Cyber attack(2009)
Chinese Government Hackers gained access to several Google’s corporate
servers and intellectual property was stolen.
3.Teen Hacks NASA and US Defense Department(1999)
Jonathan James(15) , penetrate the computers of US department of
defense division and installed a backdoor on its servers.
3. Major Cyber Attacks
In India
According to EY’s latest global information Security Survey(GISS,2018-19) –India
Edition, One of the highest number of cyber threats have been detected in India and
the country ranks 2nd in terms of cyber-Targeted attacks.
Banking and Telecom are the most attacked sectors.
1.Cosmos Bank Cyber Attack in Pune(2018)
This daring attack shook the whole banking sector of India, when hackers siphoned
off Rs.94.42 crores from Cosmos Cooperative Bank Ltd. In Pune.
4. 2.ATM system hacked (2018)
Canera bank ATM servers were targeted in cyber attack .20 lakhs rupees were
wiped off from various bank accounts.
3.UIDAI Aadhaar Software Hacked(2018)
Massive Data Breech of personal records of 1.1 Billion Indian Aadhaar Card
Holders.
5. 4.SIM Swap Scam
Two hackers from Navi Mumbai Transferred 4 crore from several bank accounts.
5.WannaCry(2017)
It is a ransomware attack in five big cities of India.
6.Mirai Botnet
It is malware that infects smart devices that run on ARC processors.
Motives Behind Cyber Attack
1.To seek commercial gain by hacking banks and financial institutions.
2.To Attack critical assets of a nation.
3.To penetrate both corporate and military data Servers to obtain plans and intelligence.
4.To hack sites to virally communicate a message for some specific campaign related to
politics and society.
5.To achieve information or money from a particular person as a target.
Types of Cyber Attacks-
1.Malware(Malicious Software)
Designed to cause damage to single computer or server.
e.g., Ransomware, Spyware, Worms , Viruses and trojans.
2.Phishing
It is method of trying to gather personal information Using deceptive e-mails and
websites.
6. 3.Denial of service attacks-A DoS attack is an attack meant to shut down a machine
or network making it inaccessible to its intended users.
4.Man in the Middle Attack(MITM Attack)
5.SQL injection(structured query language)-It targets the servers that stores critical
data for websites.
6.Cross Site Scripting(XSS)-It injects malicious code into a website but in this case,
website itself is not being attacked.
7.Social Engineering-It is an attack that relies on human interaction to trick users
into breaking security procedures to gain sensitive information that is typically
protected.
7. Need for Countering Cyber Terrorism
1.For individuals -inappropriate use of personal information shared
on social networking sites leading to serious and even life-threatening
incidents
2.For business organizations- A cyber attack may lead to loss of
private data ,competitive info. Resulting into complete loss of public
trust on integrity of organization
3.For govt.-government’s data such as geographical military strategic
asset can be stolen by a cyber attack.
8. Combating cyber terrorism
1. Awareness and training
2. Keep your Software and system fully up-to-date
3. Ensure End Point Protection through Software
4. Install a firewall
5. Back-up your data
6. Control Access to your System
7. Wi-Fi Security
8. Access Management and password.
9. Our Responsibility As a Civilian to Counter Cyber
Terrorism
1. Use a full-service internet security suite.
2. Use strong password .
3. Keep your software updated
4. Manage your social media settings.
5. Strengthen your home network.
6. Keep up to date on major security breaches.
7. Take measures o help protect yourself against identity thefts.