2. Introduction
What is CyberTerrorism?
Types of CyberTerrorism
Effects of CyberTerrorism
Examples of CyberTerrorism
Advantages of CyberTerrorism
Disadvantages of CyberTerrorism
How to protect ourselves?
Conclusion
3. Introduction:-
The world is a very large place, but it is
getting smaller, thanks to the invent of
computers and Information
Technology.
Cyber terrorism is any act of terrorism
that uses information systems or
digital technology.
Cyber terrorism can either be
"international", "domestic" or
"political“.
Terrorist groups use their own
computer technology to threaten or
attack a victim's computer resources.
4. A cyber-terrorist is a criminal who uses computer
technology and the Internet, especially to cause fear
and disruption. Some cyber-terrorists spread computer
viruses, and others threaten people electronically.
Some ways they do this hacking networks and
computers to find out personal information.
Since computers are so powerful, downloading software
for cyber terrorism is easy.
5.
6. I. Simple Unstructured
II. Advanced Structured
III. Complex Co-ordinated
This method doesn't do much because it
can't carry out as much information.
Example:- data remove etc.
This method has multiple systems and it has
more control, freedom and creativity towards
the attack.
Example:-Banking Robbery,ATM Failure etc.
This method has intense hacking tools and is
highly capable of target analysis, command,
control and learning capability.Ex:-Airlines Crash,
power Outages, System Down, etc.
7. Harming Effects on economy.
Damages toWebsites.
Effect on National Security.
CyberTerrorism ranges from simple hacking.
ComputerViruses to causing ofTerror war
using Computer.
9. Cyber terrorism permits terrorists to
emphasize their attacks through virtual
warfare from anywhere in the world.
To protect their new concepts by making the
patent application.
10. If you have an account on hotmail, yahoo or
excite it’s vulnerable to hacker’s.These services
allow an unlimited number of log on attempts.
Secondly the user is not notified when a number
of failed login attempts have occurred. If a
password attack has been attempted against a
user.
Password crackers attempt to obtain an account
password by exhaustively guessing word and
number combination.
11. All accounts should have passwords and the
passwords should be unique.
Change the network Configuration when
defeats become visible.
Audit system and check logs to help in
detecting and tracing.
If you are ever unsure about the safety of a
site or receive suspicious email from an
unknown address , Don’t access it.
12. Our National Security ,Databases and
Economy are extremely dependent upon
Automation .
System are Complex so controlling an attack
and achieving a desired level of damage may
be harder then using physical weapons.
The evidence shows that terrorist groups
have an interest in conducting Cyber attacks.
They are attempting to developed and deploy
this capability through online training.