Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber terrorism by_Ali_Fahad


Published on

  • goooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooddddddddddddddddddddddddddddddddddddddddddddddddddddd
    Are you sure you want to  Yes  No
    Your message goes here

Cyber terrorism by_Ali_Fahad

  1. 1. 3 October 2001 Cyberterrorism/P McGregor 1
  2. 2. Presenter Ali Fahad 2
  3. 3. Cyberterrorism The Bloodless War?2 January 2012 CyberTerrorism/Ali Fahad
  4. 4. CyberTerrorism Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, hacking.2 January 2012 CyberTerrorism/Ali Fahad
  5. 5. Strategies of Cyber Terrorism The basic elements are:  Hacking Breaking into others system  Virus writing  Electronic snooping Acquiring others private information  Old-fashioned human spying Terrorist first must compromise private and secure networks2 January 2012 CyberTerrorism/Ali Fahad 5
  6. 6. Why Use Cyber Warfare? Low barriers to entry – laptops cost a lot less than tanks Complex societies are dependent on computers and networks Online Banking and money storage Companies stores data online Different Countries2 January 2012 CyberTerrorism/Ali Fahad 6
  7. 7. Forms of Cyber Terrorism Bank Threatening Personal Information Gain Gaining Publicity Assassination Data Stealing2 January 2012 CyberTerrorism/Ali Fahad 7
  8. 8. Commercial Sector a Key Target Communication systems  News organizations  Network suppliers Corporations  Component suppliers (boots, food, radios, etc.)  Civilian consulting companies Financial institutions  Government funds tied up in commercial banks Healthcare industry  Pharmacies, hospitals, clinics  Drug companies (vaccines, antibiotics)2 January 2012 CyberTerrorism/Ali Fahad 8
  9. 9. But Companies Not the Only Targets Power grids  For 11 days in Feb 2001, a development server at cal- ISO electricity exchange was left connected to the internet and was being quietly hacked Personal Data  Terrorist hacks the computers and access personal data for the their use.2 January 2012 CyberTerrorism/Ali Fahad 9
  10. 10. Effects of CyberTerrorism Harming effects on economy Damages to websites Cyberterrorism ranges from simple hacking and computer viruses to causing of terror war using computer2 January 2012 CyberTerrorism/Ali Fahad 10
  11. 11. Cyber Terrorism in Pakistan Many cases found in Pakistan during last decade. Naeem Noor Khan, an alleged al-Qaeda operative and computer expert, was arrested in Pakistan in 2004 and files found on his laptop contained details of a plot to attack US financial buildings and locations in Britain.2 January 2012 CyberTerrorism/Ali Fahad 11
  12. 12. Steps By Pakistan Pakistan government has taken serious step to abandon cyberterrorism in Pakistan. Federal Intelligence Agency  NR3C (National Response Center for Cyber Crimes) Electronic Transaction Ordinance 2002 Cyber Crime bill 20072 January 2012 CyberTerrorism/Ali Fahad 12
  13. 13. 2 January 2012 CyberTerrorism/Ali Fahad 13
  14. 14. Pakistan sets death penalty for cyber terrorism Pakistan has taken the unprecedented step of making cyber terrorism a crime punishable by death, according to a decree issued by President Asif Ali Zardari.2 January 2012 CyberTerrorism/Ali Fahad 14
  15. 15. What Can We Do? Go on the defensive now  Educate senior management on risks of cyberwarfare  Make information security a top priority  Enhance your security technology Help government and security agencies  IT ISAC  PCF ( Pakistan Cyber Force)  NR3C2 January 2012 CyberTerrorism/Ali Fahad 15
  16. 16. 2 January 2012 CyberTerrorism/Ali Fahad 16