SlideShare a Scribd company logo
NANDHA ENGINEERING
COLLEGE
ERODE-52
CYBER WAR-A NEW
FACE OF TERRORISM
Guided by
E.Kanimozhi ,M.E
AP/Dept of IT
PRESENTED BY
S.INDHUJA
G.KEERTHANA PREETHI
Objective:
Revenge
Politics
Protest
Disrupt the activities of an enemy

country
CYBER WAR
The use of computers to disrupt the
activities of an enemy country, especially the
deliberate attacking of communication
systems.
Cyberterrorism Definition
1.

Political agenda

2.

Use of computers and cyberspace to disrupt
or destroy (may or may not lead to deaths)

3.

Civilians as targets

4.

Publicity

5.

Non-state actors

Traditional Terrorism definition:
•

Use of violence
Cyber Terrorism
Cyber terrorism is the use of Internet
based attacks in terrorist activities,
including acts of deliberate, large-scale
disruption of computer networks, especially
of personal computers attached to the
Internet, by the means of tools such
as computer viruses.

 Cyber terrorism can be also defined as the
intentional use of computer networks, and
public internet to cause destruction and harm
for personal objectives . Objectives may be
political or ideological since this is a form of
terrorism.
Attack Targets
Cell phone worms.
Rootkits.
Trojans.
Spreading virus via trojans.
Distributed denial-of-service attack (DDoS)
A distributed denial-of-service (DDoS) attack
is one in which a multitude of compromised systems
attack a single target, thereby causing denial of
service for users of the targeted system.


 The flood of incoming messages to the target

system essentially forces it to shut down.

Types:
Network centric attack (bandwidth)
Application layer attack(app., calls)
Cyberspace:
 The term cyberspace has become a conventional means to describe

anything associated with the Internet and the diverse Internet culture.

Amongst individuals on cyberspace, there is believed to be a code
of shared rules and ethics mutually beneficial for all to follow, referred to
as cyberethics.

Threats in Cyberspace
1.

Hacktivism

2.

Cybercrime

3.

Cyber terrorism
Levels of Cyber
Terrorism:
Simple Un-Structured
Advanced –Structured
Complex coordinated
The Nature of the Internet:
Strength and Weaknesses
• Redundancy

• Flaws

• Wireless

• Reliance on private

• Vulnerabilities and

flaws can be corrected

sector
Cyber security
Complex security risks and challenges.
Limiting the risk to data before attacks occur is

accomplished through risk assessment
&management.
Solutions:
We provide the following
ProActive&ReActivetechniqs :
Peventive safety measures to tackle cyber attacks,

setting up own team, Computer Forensics, Social
Engineering, identifying vulnerabilities and patching up,
investigating various Cyber Crimes, Penetration and
other crash courses.
Area Of Research
Cyber Terrorism
Advantages:
•Using Cyber Warfare we can obtain critical information on
our enemies.
•New job opportunities in the IT world in this field, especially for
military

Disadvantages:
•We need to be very careful how and were we put data on the web.
•The US is attacked millions of times daily.
•If someone were to break through our cyber security it could have a
huge impact.
•It could take hours to days to fix a breach in security.
Conclusion:
o

Capacity of human mind is unfathomable. It is not possible to
eliminate cyber crime from the cyber space. It is quite possible to check
them. History is the witness that no legislation has succeeded in totally
eliminating crime from the globe.
o

The only possible step is to make people aware of their rights
and duties (to report crime as a collective duty towards the society) and
further making the application of the laws more stringent to check crime.

http://mutex.gmu.edu:2048/login?url=http://
ha
T

ou
kY
n

More Related Content

What's hot

Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
kibrutry
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17
Robert Venekamp
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Master Homeland Security 2014 Lisi
Master Homeland Security 2014 LisiMaster Homeland Security 2014 Lisi
Master Homeland Security 2014 Lisi
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Brooks18
Brooks18Brooks18
Brooks18
 
Hacking
Hacking Hacking
Hacking
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Network security
Network securityNetwork security
Network security
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Hippies or Cyber Thugs? Hactivism on the College Campus
Digital Hippies or Cyber Thugs? Hactivism on the College CampusDigital Hippies or Cyber Thugs? Hactivism on the College Campus
Digital Hippies or Cyber Thugs? Hactivism on the College Campus
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the future
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
 

Viewers also liked

Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
Benjamin Morley
 
The 2nd Space Revolution
The 2nd Space RevolutionThe 2nd Space Revolution
The 2nd Space Revolution
Fabernovel
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Viewers also liked (9)

The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyberwar
CyberwarCyberwar
Cyberwar
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
The 2nd Space Revolution
The 2nd Space RevolutionThe 2nd Space Revolution
The 2nd Space Revolution
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Space powerpoint
Space powerpointSpace powerpoint
Space powerpoint
 
Space Exploration
Space ExplorationSpace Exploration
Space Exploration
 

Similar to Cyber War

Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 

Similar to Cyber War (20)

Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 

Cyber War

  • 2. CYBER WAR-A NEW FACE OF TERRORISM Guided by E.Kanimozhi ,M.E AP/Dept of IT PRESENTED BY S.INDHUJA G.KEERTHANA PREETHI
  • 4. CYBER WAR The use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems.
  • 5.
  • 6. Cyberterrorism Definition 1. Political agenda 2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3. Civilians as targets 4. Publicity 5. Non-state actors Traditional Terrorism definition: • Use of violence
  • 7. Cyber Terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. 
  • 8.  Cyber terrorism can be also defined as the intentional use of computer networks, and public internet to cause destruction and harm for personal objectives . Objectives may be political or ideological since this is a form of terrorism.
  • 9. Attack Targets Cell phone worms. Rootkits. Trojans. Spreading virus via trojans.
  • 10. Distributed denial-of-service attack (DDoS) A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.   The flood of incoming messages to the target system essentially forces it to shut down. Types: Network centric attack (bandwidth) Application layer attack(app., calls)
  • 11. Cyberspace:  The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. Amongst individuals on cyberspace, there is believed to be a code of shared rules and ethics mutually beneficial for all to follow, referred to as cyberethics. 
  • 13. Levels of Cyber Terrorism: Simple Un-Structured Advanced –Structured Complex coordinated
  • 14. The Nature of the Internet: Strength and Weaknesses • Redundancy • Flaws • Wireless • Reliance on private • Vulnerabilities and flaws can be corrected sector
  • 15. Cyber security Complex security risks and challenges. Limiting the risk to data before attacks occur is accomplished through risk assessment &management.
  • 16. Solutions: We provide the following ProActive&ReActivetechniqs : Peventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and other crash courses.
  • 18. Advantages: •Using Cyber Warfare we can obtain critical information on our enemies. •New job opportunities in the IT world in this field, especially for military Disadvantages: •We need to be very careful how and were we put data on the web. •The US is attacked millions of times daily. •If someone were to break through our cyber security it could have a huge impact. •It could take hours to days to fix a breach in security.
  • 19. Conclusion: o Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. o The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. http://mutex.gmu.edu:2048/login?url=http://