SlideShare a Scribd company logo
1 of 18
Cyber Terrorism
Prepared by : Awder Muahamad
University of halabja
Computer scince
“Cyber terrorism”
“ Tomorrow’s terrorist may be able to do more
damage with a keyboard than with a bomb
Content:
 Introduction
Cyber terrorism
Common attack
Examples
Affect In Future
Prevention & Protection
Conclusion
INTRODUCTION
 As the use of Internet is increasing day by day, traditional
concepts and methods of terrorism have taken new
dimensions.
 Individuals or groups can use the anonymity afforded by
cyberspace to threaten citizens, specific groups (i.e. with
membership based on ethnicity or belief), communities and
even the countries.
What is Cyber terrorism??
 Cyber terrorism is a phrase used to describe the use of
Internet based attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer networks,
especially of personal computers attached to the Internet, by
the means of tools such as computer viruses.
“ Featurers of Cyber terrorism
 Difficulty Identifying Attackers: It remains difficult to determine the identity
of the initiators of most cyber attacks.
 Lack of Boundaries: Attacks can originate from anywhere in the world and
from multiple locations simultaneously.
 Speed of Development: The time between the discovery of a new
vulnerability and the emergence of a new tool or technique that exploits
the vulnerability is getting shorter
 Low Cost of Tools: The technology employed in attacks is simple to use,
inexpensive, and widely available.
 Automated Methods: The methods of attack have become automated and
more sophisticated, resulting in greater damage from a single attack.
Examples of Cyber terrorism
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terroristic threats made via e-mail.
How does Cyber Terrorism work?
Hacking : To gain access to (a computer file or network) illegally or without
authorization.
Misinformation: To provide with incorrect information.
Virus: A computer program that duplicates itself in a manner that is harmful
to normal computer use. Most viruses work by attaching themselves to
another program. The amount of damage varies; viruses may erase all data or
do nothing but reproduce themselves.
Worm: A malicious program that replicates itself until it fills all of the storage
space on a drive or network
3 most common attack methods
₰ IP spoofing.
₰ Password Cracking.
₰ Denial-of-service attacks.
IP Spoofing:
 Refers to creation of IP packets with forged source IP address with the
purpose of concealing the identity of sender.
 Mostly used in Denial-of-Service attacks.
Password Cracking:
 Password cracking can be implemented using brute-force attacks, Trojan
horse programs and IP spoofing.
 Password attacks usually refer to repeated attempts to identify a user
account and/or password; these repeated attempts are called brute-force
attacks.
Denial-of-Service attacks:
 Denial-of-service attacks focus on making a service unavailable to
intended users.
 2 forms of DoS attacks: those that crash services and those that flood
services.
 One common attack method involves saturating the target machine with
communications requests such that it cannot respond to the traffic
Examples of Cyber terrorist attacks:
 9/11 attack.
 Ahmedabad bomb blast.
 26/11 Mumbai attack.
How does Cyber Terrorism affect you and your future?
 Air traffic control towers or our airlines infrastructure could be
hacked into.
 Banking systems could be violated and all of our money could
be stolen.
 Bombs and other explosives could be set off by remote.
Hospitals could lose all of their information.
 Learn Government secrets and plans
Prevention & Protection:
 Be cautious about opening email attachments.
 Complete Software Updates
 Create difficult passwords
 Download anti-virus software Uninstall unused applications or services
Conclusion
 Cyber terrorism is a scary concept for many reasons.
 It can do possible serious damages to various aspects of our lives. It is
even scarier that cyber terrorism is so difficult to catch and track and
prosecute.
 All we can do as citizens is to protect ourselves by protecting our
information, who we give it to and how much we give it out.
“ thanks to waching”

More Related Content

What's hot

Cyber threats
Cyber threatsCyber threats
Cyber threats
kelsports
 

What's hot (19)

Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Attack types
Attack typesAttack types
Attack types
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorism
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Online safety
Online safety Online safety
Online safety
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Similar to Cyber terrorism

Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 

Similar to Cyber terrorism (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 

More from c_s_halabja (7)

Vpn
VpnVpn
Vpn
 
5G
5G5G
5G
 
Optical computer
Optical computer Optical computer
Optical computer
 
Li-Fi vs. Wi-Fi
Li-Fi vs. Wi-FiLi-Fi vs. Wi-Fi
Li-Fi vs. Wi-Fi
 
IT in automobile
IT in automobile IT in automobile
IT in automobile
 
Unicode and kurdish fonts
Unicode and kurdish fontsUnicode and kurdish fonts
Unicode and kurdish fonts
 
Fiber optic
Fiber opticFiber optic
Fiber optic
 

Recently uploaded

Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Lokesh Kothari
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Sérgio Sacani
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
Sérgio Sacani
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
Sérgio Sacani
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
gindu3009
 

Recently uploaded (20)

Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCRStunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
Stunning ➥8448380779▻ Call Girls In Panchshil Enclave Delhi NCR
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls AgencyHire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
Hire 💕 9907093804 Hooghly Call Girls Service Call Girls Agency
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Green chemistry and Sustainable development.pptx
Green chemistry  and Sustainable development.pptxGreen chemistry  and Sustainable development.pptx
Green chemistry and Sustainable development.pptx
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Botany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdfBotany 4th semester file By Sumit Kumar yadav.pdf
Botany 4th semester file By Sumit Kumar yadav.pdf
 

Cyber terrorism

  • 1. Cyber Terrorism Prepared by : Awder Muahamad University of halabja Computer scince
  • 2. “Cyber terrorism” “ Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb
  • 3. Content:  Introduction Cyber terrorism Common attack Examples Affect In Future Prevention & Protection Conclusion
  • 4. INTRODUCTION  As the use of Internet is increasing day by day, traditional concepts and methods of terrorism have taken new dimensions.  Individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and even the countries.
  • 5. What is Cyber terrorism??  Cyber terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 6. “ Featurers of Cyber terrorism  Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks.  Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously.  Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorter  Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available.  Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack.
  • 7. Examples of Cyber terrorism  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terroristic threats made via e-mail.
  • 8. How does Cyber Terrorism work? Hacking : To gain access to (a computer file or network) illegally or without authorization. Misinformation: To provide with incorrect information. Virus: A computer program that duplicates itself in a manner that is harmful to normal computer use. Most viruses work by attaching themselves to another program. The amount of damage varies; viruses may erase all data or do nothing but reproduce themselves. Worm: A malicious program that replicates itself until it fills all of the storage space on a drive or network
  • 9. 3 most common attack methods ₰ IP spoofing. ₰ Password Cracking. ₰ Denial-of-service attacks.
  • 10. IP Spoofing:  Refers to creation of IP packets with forged source IP address with the purpose of concealing the identity of sender.  Mostly used in Denial-of-Service attacks.
  • 11. Password Cracking:  Password cracking can be implemented using brute-force attacks, Trojan horse programs and IP spoofing.  Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks.
  • 12. Denial-of-Service attacks:  Denial-of-service attacks focus on making a service unavailable to intended users.  2 forms of DoS attacks: those that crash services and those that flood services.  One common attack method involves saturating the target machine with communications requests such that it cannot respond to the traffic
  • 13.
  • 14. Examples of Cyber terrorist attacks:  9/11 attack.  Ahmedabad bomb blast.  26/11 Mumbai attack.
  • 15. How does Cyber Terrorism affect you and your future?  Air traffic control towers or our airlines infrastructure could be hacked into.  Banking systems could be violated and all of our money could be stolen.  Bombs and other explosives could be set off by remote. Hospitals could lose all of their information.  Learn Government secrets and plans
  • 16. Prevention & Protection:  Be cautious about opening email attachments.  Complete Software Updates  Create difficult passwords  Download anti-virus software Uninstall unused applications or services
  • 17. Conclusion  Cyber terrorism is a scary concept for many reasons.  It can do possible serious damages to various aspects of our lives. It is even scarier that cyber terrorism is so difficult to catch and track and prosecute.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to and how much we give it out.
  • 18. “ thanks to waching”