Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber War 1st Prize


Published on

we did this presentation very well and got gud commands...
Especially NO QURIES........... :-)

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Cyber War 1st Prize

  3. 3. Objective: Revenge Politics Protest Disrupt the activities of an enemy country
  4. 4. CYBER WAR The use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems.
  5. 5. Cyberterrorism Definition 1. Political agenda 2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3. Civilians as targets 4. Publicity 5. Non-state actors Traditional Terrorism definition: • Use of violence
  6. 6. Cyber Terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. 
  7. 7.  Cyber terrorism can be also defined as the intentional use of computer networks, and public internet to cause destruction and harm for personal objectives . Objectives may be political or ideological since this is a form of terrorism.
  8. 8. Attack Targets Cell phone worms. Rootkits. Trojans. Spreading virus via trojans.
  9. 9. Distributed denial-of-service attack (DDoS) A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.   The flood of incoming messages to the target system essentially forces it to shut down. Types: Network centric attack (bandwidth) Application layer attack(app., calls)
  10. 10. Cyberspace:  The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. Amongst individuals on cyberspace, there is believed to be a code of shared rules and ethics mutually beneficial for all to follow, referred to as cyberethics. 
  11. 11. Threats in Cyberspace 1. Hacktivism 2. Cybercrime 3. Cyber terrorism
  12. 12. Levels of Cyber Terrorism: Simple Un-Structured Advanced –Structured Complex coordinated
  13. 13. The Nature of the Internet: Strength and Weaknesses • Redundancy • Flaws • Wireless • Reliance on private • Vulnerabilities and flaws can be corrected sector
  14. 14. Cyber security Complex security risks and challenges. Limiting the risk to data before attacks occur is accomplished through risk assessment &management.
  15. 15. Solutions: We provide the following ProActive&ReActivetechniqs : Peventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and other crash courses.
  16. 16. Area Of Research Cyber Terrorism
  17. 17. Advantages: •Using Cyber Warfare we can obtain critical information on our enemies. •New job opportunities in the IT world in this field, especially for military Disadvantages: •We need to be very careful how and were we put data on the web. •The US is attacked millions of times daily. •If someone were to break through our cyber security it could have a huge impact. •It could take hours to days to fix a breach in security.
  18. 18. Conclusion: o Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. o The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.
  19. 19. ha T ou kY n