SlideShare a Scribd company logo
1 of 12
Cyber Terrorism
 Introduction
 What is CyberTerrorism?
 Types of CyberTerrorism
 Effects of CyberTerrorism
 Examples of CyberTerrorism
 Advantages of CyberTerrorism
 Disadvantages of CyberTerrorism
 How to protect ourselves?
 Conclusion
Introduction:-
 The world is a very large place, but it is
getting smaller, thanks to the invent of
computers and Information
Technology.
 Cyber terrorism is any act of terrorism
that uses information systems or
digital technology.
 Cyber terrorism can either be
"international", "domestic" or
"political“.
 Terrorist groups use their own
computer technology to threaten or
attack a victim's computer resources.
 A cyber-terrorist is a criminal who uses computer
technology and the Internet, especially to cause fear
and disruption. Some cyber-terrorists spread computer
viruses, and others threaten people electronically.
 Some ways they do this hacking networks and
computers to find out personal information.
 Since computers are so powerful, downloading software
for cyber terrorism is easy.
I. Simple Unstructured
II. Advanced Structured
III. Complex Co-ordinated
This method doesn't do much because it
can't carry out as much information.
Example:- data remove etc.
This method has multiple systems and it has
more control, freedom and creativity towards
the attack.
Example:-Banking Robbery,ATM Failure etc.
This method has intense hacking tools and is
highly capable of target analysis, command,
control and learning capability.Ex:-Airlines Crash,
power Outages, System Down, etc.
 Harming Effects on economy.
 Damages toWebsites.
 Effect on National Security.
 CyberTerrorism ranges from simple hacking.
 ComputerViruses to causing ofTerror war
using Computer.
ATM Failure
Power Outages
PoisonedWater Supply
WorldTrade Center
Oil Refinery Fire
911 System Down
Airlines Crash
Telephone Outages
 Cyber terrorism permits terrorists to
emphasize their attacks through virtual
warfare from anywhere in the world.
 To protect their new concepts by making the
patent application.
 If you have an account on hotmail, yahoo or
excite it’s vulnerable to hacker’s.These services
allow an unlimited number of log on attempts.
 Secondly the user is not notified when a number
of failed login attempts have occurred. If a
password attack has been attempted against a
user.
 Password crackers attempt to obtain an account
password by exhaustively guessing word and
number combination.
 All accounts should have passwords and the
passwords should be unique.
 Change the network Configuration when
defeats become visible.
 Audit system and check logs to help in
detecting and tracing.
 If you are ever unsure about the safety of a
site or receive suspicious email from an
unknown address , Don’t access it.
 Our National Security ,Databases and
Economy are extremely dependent upon
Automation .
 System are Complex so controlling an attack
and achieving a desired level of damage may
be harder then using physical weapons.
 The evidence shows that terrorist groups
have an interest in conducting Cyber attacks.
 They are attempting to developed and deploy
this capability through online training.

More Related Content

What's hot (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber space.pdf
cyber space.pdfcyber space.pdf
cyber space.pdf
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
הצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתהצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתפוליסה
 
Patent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protectedPatent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protectedKrishan Singla
 
Failure of the German Revolutions
Failure of the German Revolutions Failure of the German Revolutions
Failure of the German Revolutions Pat Wilson
 
Ngs Hsm 700bl Module 4 01062009
Ngs Hsm 700bl Module 4 01062009Ngs Hsm 700bl Module 4 01062009
Ngs Hsm 700bl Module 4 01062009Peter Stinson
 
The Revolutions in England
The Revolutions in England The Revolutions in England
The Revolutions in England shackkyl
 
The Effects of War
The Effects of WarThe Effects of War
The Effects of Warrklinden
 
Causes and Concequences of Colour Revolutions in the Post-Soviet Countries
Causes and Concequences of Colour Revolutions in the Post-Soviet CountriesCauses and Concequences of Colour Revolutions in the Post-Soviet Countries
Causes and Concequences of Colour Revolutions in the Post-Soviet CountriesMikhail / Mykhailo Minakov
 
The Paradox Of Growth - Pipal Research
The Paradox Of Growth - Pipal ResearchThe Paradox Of Growth - Pipal Research
The Paradox Of Growth - Pipal ResearchJaspal Singh
 
8 Industrialization to Imperialism
8  Industrialization to Imperialism8  Industrialization to Imperialism
8 Industrialization to Imperialismmvastola
 
6 political revolutions
6  political revolutions6  political revolutions
6 political revolutionsmvastola
 
World War I Causes
World War I  CausesWorld War I  Causes
World War I Causesjoeseb55
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 

Viewers also liked (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
הצעת החוק ריבית עונשית
הצעת החוק ריבית עונשיתהצעת החוק ריבית עונשית
הצעת החוק ריבית עונשית
 
Patent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protectedPatent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protected
 
Failure of the German Revolutions
Failure of the German Revolutions Failure of the German Revolutions
Failure of the German Revolutions
 
Ngs Hsm 700bl Module 4 01062009
Ngs Hsm 700bl Module 4 01062009Ngs Hsm 700bl Module 4 01062009
Ngs Hsm 700bl Module 4 01062009
 
The Revolutions in England
The Revolutions in England The Revolutions in England
The Revolutions in England
 
9f effects of the war
9f effects of the war9f effects of the war
9f effects of the war
 
The Effects of War
The Effects of WarThe Effects of War
The Effects of War
 
Effect of War-Time Censorship on Historical Sources
Effect of War-Time Censorship on Historical SourcesEffect of War-Time Censorship on Historical Sources
Effect of War-Time Censorship on Historical Sources
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Causes and Concequences of Colour Revolutions in the Post-Soviet Countries
Causes and Concequences of Colour Revolutions in the Post-Soviet CountriesCauses and Concequences of Colour Revolutions in the Post-Soviet Countries
Causes and Concequences of Colour Revolutions in the Post-Soviet Countries
 
The Paradox Of Growth - Pipal Research
The Paradox Of Growth - Pipal ResearchThe Paradox Of Growth - Pipal Research
The Paradox Of Growth - Pipal Research
 
Ireland and world war two
Ireland and world war twoIreland and world war two
Ireland and world war two
 
8 Industrialization to Imperialism
8  Industrialization to Imperialism8  Industrialization to Imperialism
8 Industrialization to Imperialism
 
6 political revolutions
6  political revolutions6  political revolutions
6 political revolutions
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
World War I Causes
World War I  CausesWorld War I  Causes
World War I Causes
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
it act
it actit act
it act
 

Similar to Cyber Terrorism

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptxsagarpanthee
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in DemandSamidha Takle
 

Similar to Cyber Terrorism (20)

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
cyber crime
cyber crimecyber crime
cyber crime
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Professionals in Demand
Cyber Security Professionals in DemandCyber Security Professionals in Demand
Cyber Security Professionals in Demand
 

Recently uploaded

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样AS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书F
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理F
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Dewi Agency
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...mikehavy0
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxthinamazinyo
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证hfkmxufye
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsrahman018755
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样AS
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样ayvbos
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理SS
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC
 

Recently uploaded (20)

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 

Cyber Terrorism

  • 2.  Introduction  What is CyberTerrorism?  Types of CyberTerrorism  Effects of CyberTerrorism  Examples of CyberTerrorism  Advantages of CyberTerrorism  Disadvantages of CyberTerrorism  How to protect ourselves?  Conclusion
  • 3. Introduction:-  The world is a very large place, but it is getting smaller, thanks to the invent of computers and Information Technology.  Cyber terrorism is any act of terrorism that uses information systems or digital technology.  Cyber terrorism can either be "international", "domestic" or "political“.  Terrorist groups use their own computer technology to threaten or attack a victim's computer resources.
  • 4.  A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber-terrorists spread computer viruses, and others threaten people electronically.  Some ways they do this hacking networks and computers to find out personal information.  Since computers are so powerful, downloading software for cyber terrorism is easy.
  • 5.
  • 6. I. Simple Unstructured II. Advanced Structured III. Complex Co-ordinated This method doesn't do much because it can't carry out as much information. Example:- data remove etc. This method has multiple systems and it has more control, freedom and creativity towards the attack. Example:-Banking Robbery,ATM Failure etc. This method has intense hacking tools and is highly capable of target analysis, command, control and learning capability.Ex:-Airlines Crash, power Outages, System Down, etc.
  • 7.  Harming Effects on economy.  Damages toWebsites.  Effect on National Security.  CyberTerrorism ranges from simple hacking.  ComputerViruses to causing ofTerror war using Computer.
  • 8. ATM Failure Power Outages PoisonedWater Supply WorldTrade Center Oil Refinery Fire 911 System Down Airlines Crash Telephone Outages
  • 9.  Cyber terrorism permits terrorists to emphasize their attacks through virtual warfare from anywhere in the world.  To protect their new concepts by making the patent application.
  • 10.  If you have an account on hotmail, yahoo or excite it’s vulnerable to hacker’s.These services allow an unlimited number of log on attempts.  Secondly the user is not notified when a number of failed login attempts have occurred. If a password attack has been attempted against a user.  Password crackers attempt to obtain an account password by exhaustively guessing word and number combination.
  • 11.  All accounts should have passwords and the passwords should be unique.  Change the network Configuration when defeats become visible.  Audit system and check logs to help in detecting and tracing.  If you are ever unsure about the safety of a site or receive suspicious email from an unknown address , Don’t access it.
  • 12.  Our National Security ,Databases and Economy are extremely dependent upon Automation .  System are Complex so controlling an attack and achieving a desired level of damage may be harder then using physical weapons.  The evidence shows that terrorist groups have an interest in conducting Cyber attacks.  They are attempting to developed and deploy this capability through online training.