Cyber terrorism

974 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
974
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
54
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber terrorism

  1. 1. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comCYBER TERRORISMJENI VARGHESEPATENT DEPT.
  2. 2. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comCYBER TERRORISM• The term ‘cyber terrorism’ was coined in 1996 byBarry Collin.• Cyber terrorism - “convergence of cyberspace andterrorism”.
  3. 3. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comCYBER TERRORISM• US national infrastructure protection centre(2001) has defined cyber terrorism as:“A criminal act perpetrated by the use of computersand telecommunications capabilities, resulting inviolence, destruction and/or disruption of services,where the intended purpose is to create fear by causingconfusion and uncertainty within a given population,with the goal of influencing a government orpopulation to conform to a particular political, socialor ideological agenda.”• Use of computers, internet and informationgateways to support traditional terrorism.
  4. 4. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comCYBER TERRORISM• Targets may include power plants, militaryinstallations, the banking industry, air traffic controlcenters, water systems, and other major centersaffecting the lives and well-being of many people andcompanies.•
  5. 5. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comFEATURES OF CYBERTERRORISM• Difficulty Identifying Attackers: It remains difficult todetermine the identity of the initiators of most cyber attacks.• Lack of Boundaries: Attacks can originate from anywhere inthe world and from multiple locations simultaneously.• Speed of Development: The time between the discovery of anew vulnerability and the emergence of a new tool ortechnique that exploits the vulnerability is getting shorter.• Low Cost of Tools: The technology employed in attacks issimple to use, inexpensive, and widely available.• Automated Methods: The methods of attack have becomeautomated and more sophisticated, resulting in greaterdamage from a single attack.
  6. 6. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comFORMS OF CYBERTERRORISMSome of the forms of cyber terrorism are:(a) Privacy violation.(b) Secret information appropriation and datatheft.(c) Demolition of e-governance base.(d) Distributed Denial of Services (DoS) attack.(e) Network damage and disruptions.(f) Use of cyber communications for terrorism.
  7. 7. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comMETHODS OF ATTACKThree methods of attack: involves different typesof weapons(a) Physical Attack:•against computer facilities and/or transmission lines.•accomplished by use of conventional weapons to destroy or seriouslyinjure computers and their terminals.(b) Electronic Attack:•use of power of electromagnetic energy or electromagnetic pulse tooverload computer circuitry.(c) Cyber Attack or Computer Network Attack:•use of a malicious code to take advantage of softwares weakness; or•an attacker uses stolen information to enter restricted computer systems.
  8. 8. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comTOOLS FOR CYBERTERRORISMSome of the tools used by cyber terrorists todisseminate their agenda are:-(a)Virus: A computer program that can replicateitself and spread from one computer to another.(b)Worm: a standalone computer program thatreplicates itself in order to spread to othercomputers.(c) Trojan Horse: A non-self-replicating type ofmalware which facilitates unauthorized access tothe users computer system.
  9. 9. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comTOOLS FOR CYBERTERRORISM(d) Logic Bomb: A piece of code intentionallyinserted into a software system that will setoff a malicious function when specifiedconditions are met.(e)Trap Doors: A method of gaining access tosome part of a system other than by thenormal procedure.(f)Denial of Service: The attacker sends almostinnumerable requests for information/e-mailthat cause a computer systems to crash.
  10. 10. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comTOOLS FOR CYBERTERRORISM(g) Use of Cryptography andSteganography: to aid terrorismCryptography: Information is transformed intounreadable format (cipher text). Only thosewho possess a secret key can decipher (ordecrypt) the message into plain text.Steganography: Writing hidden messages in away that no one, apart from the sender andintended recipient, suspects the existence ofthe message.
  11. 11. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comINCIDENCE OF CYBERTERRORISMAl Qaeda Terrorist used the Internet to plan the September11,2001 operations upon new York City and Washington D.C.They used a special internet chat software for communication.A nuclear power plant in Iran was attacked by the Stuxnetworm. The worm installed itself in the plant’sPLC (Programming Logic Controller)computer-controlled system and caused achange in the rotational speed of machinery.The increased speed without the usualautomated shut-down controls caused thenuclear plant fusion center to spinuncontrollably and explode.2010201020012001
  12. 12. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comACTS OF CYBERTERRORISM IN INDIA• In the case of 26/11 Mumbai attacks, terrorists usedcyber communication to aide the terrorists to carry onwith the massacre.• Cyber communication was also used in July 2011Jhaveri Bazaar Mumbai bomb blasts and 2010Varanasi blasts.
  13. 13. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comINDIA : FEW INITIATIVESThe Government of India has put in place somemechanisms to counter the threat of cyber terrorism.• Indian Computer Emergency Response Team (CERT-In): a functional organization of the department ofInformation Technology with the objective ofsecuring Indian cyber space.• National Cyber Security Assurance Framework isestablished by the CERT-In for protection of CriticalInformation.• The Information Technology Act, 2000 and IT(Amendment) Act 2008.
  14. 14. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comTHE INFORMATION TECHNOLOGY ACT,2000 AND IT ACT AMENDMENT 2008.• Amendments under the Information Technology Act,2000 has defined the term “Cyber terrorism” U/Sec.66F (1).• Punishment for Cyber terrorismWhoever commits or conspires to commit cyber terrorism shall bepunishable with imprisonment which may extend toimprisonment for life. (Section 66F (2))• Section 69 gives power to the state to issue directionsfor interception or monitoring or decryption of anyinformation through any computer source.• Section 70 A and 70 B- Agency for criticalinformation and Indian Computer Emergency responseteam (CERT-In) for incident response.
  15. 15. CHENNAI3rd Floor, ‘Creative Enclave’,148-150, Luz Church Road,Mylapore,Chennai - 600 004.Tel: +91 - 44 - 2498 4821BANGALORESuite 920, Level 9,Raheja Towers,26-27, M G Road,Bangalore - 560 001.Tel: +91 - 80 - 6546 2400COIMBATOREBB1, Park Avenue,# 48, Race Course Road,Coimbatore - 641018.Tel: +91 - 422 – 6552921EMAILinfo@altacit.comWEBSITEwww.altacit.comTHANK YOU

×