SlideShare a Scribd company logo
Scanned with CamScanner
Computer Security Fundamentals
by Chuck Easttom
Chapter 12 Cyber Terrorism and Information
Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Chapter 12 ObjectivesExplain cyber terrorismUnderstand
information warfareUnderstand plausible cyber terrorism
scenariosAppreciate the dangers posed by cyber terrorism
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Explain what cyber terrorism is and how it has been used in
some actual cases.
Understand the basics of information warfare.
Have a working knowledge of some plausible cyber terrorism
scenarios.
Have an appreciation for the dangers posed by cyber terrorism.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Introduction Cyber TerrorismSimply, the use of computers to
launch a terrorist attack.Like other forms of terrorism, only the
milieu of the attack has changed.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Cyber Terrorism, according to the definition of the FBI:
Premeditated, politically motivated attack against information,
computer systems, computer programs, and data that results in
violence against noncombatant targets by subnational groups or
clandestine agents.
Typically, loss of life in a cyber attack would be less than in a
bombing attack.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Introduction (cont.)Cyber TerrorismSignificant economic
damageDisruptions to communicationsDisruptions in supply
linesGeneral degradation of the national infrastructureAll
possible via the Internet
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
All these could lead to significant deaths: train wrecks, hospital
deaths, loss of air traffic control resulting in plane crashes, and
so forth.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Introduction (cont.)Cyber TerrorismMyDoom virus may have
been an example.Our nation can expect to be the target of
serious cyber terrorism.How serious is this threat?
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Cyber Terrorism
Some experts believe that the MyDoom virus (Chapter 4) was an
example of domestic economic terrorism; just a tip of the
iceberg.
Sometime in the near future, our nation can expect to be the
target of a serious cyber terrorism attack.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Economic AttacksCyber attacks cause economic damage:Lost
files and recordsDestroyed dataStolen credit cardsMoney stolen
from accountsTime the IT staff spends cleaning up
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
These cyber attacks are not necessarily terrorist attacks. We
have gone over them in past chapters on fraud.
The focus of this chapter is the concerted and deliberate attack
against a particular target for the exclusive purpose of causing
direct damage.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Economic Attacks (cont.)Any organization wanting to do harm
could set up a group withComputer security
expertsProgramming expertsNetworking experts
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Economic Attacks (cont.)Team 1 sets up fake e-commerce sites
for a few days:Harvest credit card numbers, bank account
numbers, and so forthAll numbers posted to the Web
anonymously on a predetermined date
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
For maximum damage, Team 1 could poison the DNS server to
redirect to the bogus sites.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Economic Attacks (cont.)Team 2 creates a TrojanShowing
business tips or slogans, popular download with business
peopleDeletes key system files on a certain date
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Economic Attacks (cont.)Team 3 creates a virus. A DDoS on
key financial Web sites, all to take place on the same
predetermined date.Teams 4 and 5 footprint major bank
systems.Team 6 prepares to flood the Internet with false stock
tips.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
What if all these attacks happened on the same predetermined
day?
This could cause more damage to our nation than most
traditional (bombing) attacks have ever done.
Imagine not one group with six teams, but five groups with six
teams, with each group having a trigger date 2 weeks later than
the last.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Economic Attacks (cont.)The biological weapons expert
community has been solicited by terrorists.How long will it be
before terrorists seek out the security/hacking community?
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
These groups may already have been formed. We just don’t
know it.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Military Operations AttacksAttempts to hack into the ultra-
secure DoD, CIA, or NSA systems would be met with
immediate arrest.A successful attack on less secure systems
could also put our country at risk.Lower-level security systems
that protect the logistics programs
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
These agencies are well protected. But how about lower levels,
which can be used by hackers in reconnaissance to glean info
for social engineering?
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Military Operations Attacks (cont.)One hack finds that C-141s
are routed to a certain base.Another hack reveals food for 5,000
is delivered to that base.The final hack shows two brigades have
had leaves canceled.Social engineering puts information
together to reveal size and time of a deployment.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
C-141s are troop transport planes.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Military Operations Attacks (cont.)Variations on a themeHacker
changes the date and destination of the food and weapons
delivery.Brigades are now at risk.Without food and ammunition
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Military Operations Attacks (cont.)Illustrates the need for high
security on all military systems.There are clearly no “low-
priority” security systems.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Cliff Stoll’s hackers got into U.S. government subcontractors’
systems and used information stored there to gain higher and
higher access. They eventually got military secrets that led to
the loss of many American lives.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
General AttacksUnfocused attacks with no specific targetSheer
volume of these attacks causes significant economic damage.IT
personnel drop normal projects to combat general attacks.E-
commerce is virtually unusable.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
A continued series of attacks could cause enough fear in
individuals and companies that they would resort to antiquated
means to communicate other than the Internet.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Information WarfareAny attempt to manipulate information in
pursuit of a military or political goal:Use computers to gather
information.Use computers to disseminate propaganda.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Information Warfare (cont.)Propaganda:Any group could use
what appears to be an Internet news Web site.Many people
believe and repeat what they see on the Internet.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Propaganda is defined as “Information, ideas, opinions, or
images, often only giving one part of an argument, which are
broadcast, published, or in some other way spread with the
intention of influencing people's opinions.”
*Cambridge Dictionaries Online
http://dictionary.cambridge.org/
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Information Warfare (cont.)Information ControlSince World
War ll, part of political and military conflictsTokyo RoseRadio
Free EuropeLanguage manipulationInnocent civilians killed =
collateral damageStarting a war = preemptive action
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Propaganda
Since World War ll, part of political and military conflicts
Tokyo Rose in the Orient by the Japanese Radio Free Europe
(RFE) in the cold war by the Allies
Language manipulation Innocent civilians killed in a bombing =
collateral damage Starting a war = preemptive action
During World War II, a young Japanese-American woman
gained notoriety as “Tokyo Rose” for her broadcasts of
Japanese propaganda beamed over Radio Tokyo to American
troops in the South Pacific.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Information Warfare (cont.)Information ControlThe Internet is
an inexpensive vehicle for swaying public opinionWeb
sitesPostings to discussion groups and bulletin boardsPublic
opinion quickly gains momentumClosely related to propaganda
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Information Warfare (cont.)DisinformationLocate false
information behind relatively secure systems, but not secure
enough to keep out enemy.The work the enemy has to do to
acquire the disinformation will convince them of its value.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
*http://dictionary.cambridge.org/
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Actual CasesMany influential people do not believe in cyber
warfare.These events appear to contradict them:The People’s
Liberation Army [China] has formulated an official cyber
warfare doctrine.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
The actual events that are mentioned here are not in the text.
They are taken from a report on Cyber Warfare by the Institute
for Security Technology Studies, 2004, written in response to a
grant from the Department of Homeland Security. You may use
them as you see fit.
http://www.ists.dartmouth.edu/directors-office/cyberwarfare.pdf
“Within the framework of an integrated national plan, the
People’s Liberation Army (PLA) [China] has formulated an
official cyber warfare doctrine, implemented appropriate
training for its officers, and conducted cyber warfare
simulations and military exercises.”
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Actual Cases (cont.)In Tehran [Iran], the armed forces and
technical universities joined to create independent cyber R & D
centers and train personnel in IT skills.Tehran seeks to buy IT
technical assistance and training from Russia and India.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
In Tehran [Iran], “(T)he armed forces and technical universities
have joined in an effort to create independent cyber R & D
centers and train personnel in IT skills; and second, Tehran
actively seeks to buy IT and military related technical
assistance and training from both Russia and India. … Iran is
leveraging its resources in the non-conventional weapons and IT
sector as a ‘force multiplier’.”*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Actual Cases (cont.)Russia’s armed forces have developed a
robust cyber warfare doctrine.Moscow also has a track record of
offensive hacking into Chechen Web sites.Available evidence is
inadequate to predict whether Russia’s intelligence services or
armed forces would attack U.S. networks.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
“Russia’s armed forces, collaborating with experts in the IT
sector and academic community, have developed a robust cyber
warfare doctrine… “Information weaponry,” i.e., weapons based
on programming code, receives paramount attention in official
cyber warfare doctrine. Moscow also has a track record of
offensive hacking into Chechen Web sites.”
“Although we assess it likely that Moscow will continue to
scout U.S. military and private sector networks and Web sites,
available evidence is inadequate to predict whether Russia’s
intelligence services or armed forces would attack U.S.
networks.”*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Future TrendsPositive TrendsCyberterrorism Preparedness Act
of 2002$350,000,000 over 5 years for improving network
securityCybersecurity Research and Education Act of
2002$50,000,000 over 4years for training IT specialists in IT
security
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Do you think that’s enough money?
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Future Trends (cont.)Negative Trends
Rand report on cyber terrorism
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Possible attacks on chemical plants, water supplies, or power
supplies resulting in massive casualties, rather than simply
economic damage.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Defense Against Cyber TerrorismRecommendations for
preparing for and protecting against cyber terrorism includeA
Manhattan Project-level programResearch and academic
programs dedicated to securityComputer crime treated more
seriously
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Defense Against Cyber Terrorism (cont.)Every police
department must have access to computer crime
specialists.Security professionals must have a forum to report
and discuss emergencies.
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
TORHow it worksIllegal Markets
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
Do you think that’s enough money?
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*
SummaryThere are various forms of cyber terrorist attacks
across all industries.Many experts believe it is a credible
threat.How could your computer systems be used against you
and your company?
© 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
Information Warfare
*

More Related Content

Similar to Scanned with CamScannerComputer Security Fundame.docx

Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
Concept of threats and threat environment
Concept of threats and threat environmentConcept of threats and threat environment
Concept of threats and threat environment
Uyoyo Edosio
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
Josep Bardallo
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
whmillerjr
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
IJNSA Journal
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
amrit47
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
jdenbryston
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
The eCore Group
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
David Sweigert
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
Bradley Susser
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
malvvv
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connection
ESET Middle East
 

Similar to Scanned with CamScannerComputer Security Fundame.docx (20)

Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Concept of threats and threat environment
Concept of threats and threat environmentConcept of threats and threat environment
Concept of threats and threat environment
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
EXPLORING HISTORICAL AND EMERGING PHISHING TECHNIQUES AND MITIGATING THE ASSO...
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connection
 

More from jeffsrosalyn

Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docxProblem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
jeffsrosalyn
 
Problem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docxProblem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docx
jeffsrosalyn
 
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docxProblem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
jeffsrosalyn
 
Problem and solution essay  about the difficulties of speaking Engli.docx
Problem and solution essay  about the difficulties of speaking Engli.docxProblem and solution essay  about the difficulties of speaking Engli.docx
Problem and solution essay  about the difficulties of speaking Engli.docx
jeffsrosalyn
 
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docxproblem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
jeffsrosalyn
 
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docxProblem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
jeffsrosalyn
 
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docxProblem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
jeffsrosalyn
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
jeffsrosalyn
 
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docxProblem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
jeffsrosalyn
 
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docxProblem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
jeffsrosalyn
 
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docxProblem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
jeffsrosalyn
 
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docxProblem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
jeffsrosalyn
 
Prior to posting in this discussion, completeThe Parking Garage.docx
Prior to posting in this discussion, completeThe Parking Garage.docxPrior to posting in this discussion, completeThe Parking Garage.docx
Prior to posting in this discussion, completeThe Parking Garage.docx
jeffsrosalyn
 
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docxPrior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
jeffsrosalyn
 
Privacy in a Technological AgePrivacy protection is a hot top.docx
Privacy in a Technological AgePrivacy protection is a hot top.docxPrivacy in a Technological AgePrivacy protection is a hot top.docx
Privacy in a Technological AgePrivacy protection is a hot top.docx
jeffsrosalyn
 
Privacy Introduction Does the technology today Pene.docx
Privacy Introduction Does the technology today Pene.docxPrivacy Introduction Does the technology today Pene.docx
Privacy Introduction Does the technology today Pene.docx
jeffsrosalyn
 
Prisoner rights in America are based largely on the provisions of th.docx
Prisoner rights in America are based largely on the provisions of th.docxPrisoner rights in America are based largely on the provisions of th.docx
Prisoner rights in America are based largely on the provisions of th.docx
jeffsrosalyn
 
Principles of Supply and Demanda brief example of supply and deman.docx
Principles of Supply and Demanda brief example of supply and deman.docxPrinciples of Supply and Demanda brief example of supply and deman.docx
Principles of Supply and Demanda brief example of supply and deman.docx
jeffsrosalyn
 
Primary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docxPrimary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docx
jeffsrosalyn
 
Pretend you are a British government official during the time leadin.docx
Pretend you are a British government official during the time leadin.docxPretend you are a British government official during the time leadin.docx
Pretend you are a British government official during the time leadin.docx
jeffsrosalyn
 

More from jeffsrosalyn (20)

Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docxProblem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
Problem 7.  Dollars for WaitingJeffrey Swift has been a messenger.docx
 
Problem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docxProblem 8-2B(a) Journalize the transactions, including explanation.docx
Problem 8-2B(a) Journalize the transactions, including explanation.docx
 
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docxProblem 14-4AFinancial information for Ernie Bishop Company is pre.docx
Problem 14-4AFinancial information for Ernie Bishop Company is pre.docx
 
Problem and solution essay  about the difficulties of speaking Engli.docx
Problem and solution essay  about the difficulties of speaking Engli.docxProblem and solution essay  about the difficulties of speaking Engli.docx
Problem and solution essay  about the difficulties of speaking Engli.docx
 
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docxproblem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
problem 8-6 (LO 4) Worksheet, direct and indirect holding, interco.docx
 
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docxProblem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
Problem 4-5ADevine Brown opened Devine’s Carpet Cleaners on March .docx
 
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docxProblem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
Problem 1-4A (Part Level Submission)Matt Stiner started a delivery.docx
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income stat.docx
 
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docxProblem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
Problem 12-9ACondensed financial data of Odgers Inc. follow.ODGE.docx
 
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docxProblem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
Problem 13-6AIrwin Corporation has been authorized to issue 20,80.docx
 
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docxProblem 1-2A (Part Level Submission)On August 31, the balance sh.docx
Problem 1-2A (Part Level Submission)On August 31, the balance sh.docx
 
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docxProblem 1-2A (Part Level Submission)On August 31, the balance shee.docx
Problem 1-2A (Part Level Submission)On August 31, the balance shee.docx
 
Prior to posting in this discussion, completeThe Parking Garage.docx
Prior to posting in this discussion, completeThe Parking Garage.docxPrior to posting in this discussion, completeThe Parking Garage.docx
Prior to posting in this discussion, completeThe Parking Garage.docx
 
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docxPrior to engaging in this discussion, read Chapters 10 and 11 in y.docx
Prior to engaging in this discussion, read Chapters 10 and 11 in y.docx
 
Privacy in a Technological AgePrivacy protection is a hot top.docx
Privacy in a Technological AgePrivacy protection is a hot top.docxPrivacy in a Technological AgePrivacy protection is a hot top.docx
Privacy in a Technological AgePrivacy protection is a hot top.docx
 
Privacy Introduction Does the technology today Pene.docx
Privacy Introduction Does the technology today Pene.docxPrivacy Introduction Does the technology today Pene.docx
Privacy Introduction Does the technology today Pene.docx
 
Prisoner rights in America are based largely on the provisions of th.docx
Prisoner rights in America are based largely on the provisions of th.docxPrisoner rights in America are based largely on the provisions of th.docx
Prisoner rights in America are based largely on the provisions of th.docx
 
Principles of Supply and Demanda brief example of supply and deman.docx
Principles of Supply and Demanda brief example of supply and deman.docxPrinciples of Supply and Demanda brief example of supply and deman.docx
Principles of Supply and Demanda brief example of supply and deman.docx
 
Primary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docxPrimary Task Response Within the Discussion Board area, write 300.docx
Primary Task Response Within the Discussion Board area, write 300.docx
 
Pretend you are a British government official during the time leadin.docx
Pretend you are a British government official during the time leadin.docxPretend you are a British government official during the time leadin.docx
Pretend you are a British government official during the time leadin.docx
 

Recently uploaded

Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
dot55audits
 

Recently uploaded (20)

Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
ZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptxZK on Polkadot zero knowledge proofs - sub0.pptx
ZK on Polkadot zero knowledge proofs - sub0.pptx
 

Scanned with CamScannerComputer Security Fundame.docx

  • 1. Scanned with CamScanner Computer Security Fundamentals by Chuck Easttom Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Chapter 12 ObjectivesExplain cyber terrorismUnderstand information warfareUnderstand plausible cyber terrorism scenariosAppreciate the dangers posed by cyber terrorism © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Explain what cyber terrorism is and how it has been used in some actual cases.
  • 2. Understand the basics of information warfare. Have a working knowledge of some plausible cyber terrorism scenarios. Have an appreciation for the dangers posed by cyber terrorism. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Introduction Cyber TerrorismSimply, the use of computers to launch a terrorist attack.Like other forms of terrorism, only the milieu of the attack has changed. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Cyber Terrorism, according to the definition of the FBI: Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents. Typically, loss of life in a cyber attack would be less than in a bombing attack. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Introduction (cont.)Cyber TerrorismSignificant economic damageDisruptions to communicationsDisruptions in supply linesGeneral degradation of the national infrastructureAll possible via the Internet © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
  • 3. Information Warfare * All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Introduction (cont.)Cyber TerrorismMyDoom virus may have been an example.Our nation can expect to be the target of serious cyber terrorism.How serious is this threat? © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Cyber Terrorism Some experts believe that the MyDoom virus (Chapter 4) was an example of domestic economic terrorism; just a tip of the iceberg. Sometime in the near future, our nation can expect to be the target of a serious cyber terrorism attack. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Economic AttacksCyber attacks cause economic damage:Lost files and recordsDestroyed dataStolen credit cardsMoney stolen from accountsTime the IT staff spends cleaning up
  • 4. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * These cyber attacks are not necessarily terrorist attacks. We have gone over them in past chapters on fraud. The focus of this chapter is the concerted and deliberate attack against a particular target for the exclusive purpose of causing direct damage. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Economic Attacks (cont.)Any organization wanting to do harm could set up a group withComputer security expertsProgramming expertsNetworking experts © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Economic Attacks (cont.)Team 1 sets up fake e-commerce sites for a few days:Harvest credit card numbers, bank account numbers, and so forthAll numbers posted to the Web anonymously on a predetermined date
  • 5. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * For maximum damage, Team 1 could poison the DNS server to redirect to the bogus sites. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Economic Attacks (cont.)Team 2 creates a TrojanShowing business tips or slogans, popular download with business peopleDeletes key system files on a certain date © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Economic Attacks (cont.)Team 3 creates a virus. A DDoS on key financial Web sites, all to take place on the same predetermined date.Teams 4 and 5 footprint major bank systems.Team 6 prepares to flood the Internet with false stock tips. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare
  • 6. * What if all these attacks happened on the same predetermined day? This could cause more damage to our nation than most traditional (bombing) attacks have ever done. Imagine not one group with six teams, but five groups with six teams, with each group having a trigger date 2 weeks later than the last. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Economic Attacks (cont.)The biological weapons expert community has been solicited by terrorists.How long will it be before terrorists seek out the security/hacking community? © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * These groups may already have been formed. We just don’t know it. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Military Operations AttacksAttempts to hack into the ultra- secure DoD, CIA, or NSA systems would be met with immediate arrest.A successful attack on less secure systems could also put our country at risk.Lower-level security systems
  • 7. that protect the logistics programs © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * These agencies are well protected. But how about lower levels, which can be used by hackers in reconnaissance to glean info for social engineering? © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Military Operations Attacks (cont.)One hack finds that C-141s are routed to a certain base.Another hack reveals food for 5,000 is delivered to that base.The final hack shows two brigades have had leaves canceled.Social engineering puts information together to reveal size and time of a deployment. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * C-141s are troop transport planes. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Military Operations Attacks (cont.)Variations on a themeHacker changes the date and destination of the food and weapons delivery.Brigades are now at risk.Without food and ammunition © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
  • 8. Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Military Operations Attacks (cont.)Illustrates the need for high security on all military systems.There are clearly no “low- priority” security systems. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Cliff Stoll’s hackers got into U.S. government subcontractors’ systems and used information stored there to gain higher and higher access. They eventually got military secrets that led to the loss of many American lives. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * General AttacksUnfocused attacks with no specific targetSheer volume of these attacks causes significant economic damage.IT personnel drop normal projects to combat general attacks.E- commerce is virtually unusable. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare
  • 9. * A continued series of attacks could cause enough fear in individuals and companies that they would resort to antiquated means to communicate other than the Internet. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Information WarfareAny attempt to manipulate information in pursuit of a military or political goal:Use computers to gather information.Use computers to disseminate propaganda. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Information Warfare (cont.)Propaganda:Any group could use what appears to be an Internet news Web site.Many people believe and repeat what they see on the Internet. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Propaganda is defined as “Information, ideas, opinions, or images, often only giving one part of an argument, which are
  • 10. broadcast, published, or in some other way spread with the intention of influencing people's opinions.” *Cambridge Dictionaries Online http://dictionary.cambridge.org/ © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Information Warfare (cont.)Information ControlSince World War ll, part of political and military conflictsTokyo RoseRadio Free EuropeLanguage manipulationInnocent civilians killed = collateral damageStarting a war = preemptive action © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Propaganda Since World War ll, part of political and military conflicts Tokyo Rose in the Orient by the Japanese Radio Free Europe (RFE) in the cold war by the Allies Language manipulation Innocent civilians killed in a bombing = collateral damage Starting a war = preemptive action During World War II, a young Japanese-American woman gained notoriety as “Tokyo Rose” for her broadcasts of Japanese propaganda beamed over Radio Tokyo to American troops in the South Pacific. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Information Warfare (cont.)Information ControlThe Internet is
  • 11. an inexpensive vehicle for swaying public opinionWeb sitesPostings to discussion groups and bulletin boardsPublic opinion quickly gains momentumClosely related to propaganda © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Information Warfare (cont.)DisinformationLocate false information behind relatively secure systems, but not secure enough to keep out enemy.The work the enemy has to do to acquire the disinformation will convince them of its value. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * *http://dictionary.cambridge.org/ © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Actual CasesMany influential people do not believe in cyber warfare.These events appear to contradict them:The People’s Liberation Army [China] has formulated an official cyber warfare doctrine. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and
  • 12. Information Warfare * The actual events that are mentioned here are not in the text. They are taken from a report on Cyber Warfare by the Institute for Security Technology Studies, 2004, written in response to a grant from the Department of Homeland Security. You may use them as you see fit. http://www.ists.dartmouth.edu/directors-office/cyberwarfare.pdf “Within the framework of an integrated national plan, the People’s Liberation Army (PLA) [China] has formulated an official cyber warfare doctrine, implemented appropriate training for its officers, and conducted cyber warfare simulations and military exercises.” © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Actual Cases (cont.)In Tehran [Iran], the armed forces and technical universities joined to create independent cyber R & D centers and train personnel in IT skills.Tehran seeks to buy IT technical assistance and training from Russia and India. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * In Tehran [Iran], “(T)he armed forces and technical universities have joined in an effort to create independent cyber R & D centers and train personnel in IT skills; and second, Tehran actively seeks to buy IT and military related technical assistance and training from both Russia and India. … Iran is
  • 13. leveraging its resources in the non-conventional weapons and IT sector as a ‘force multiplier’.”* © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Actual Cases (cont.)Russia’s armed forces have developed a robust cyber warfare doctrine.Moscow also has a track record of offensive hacking into Chechen Web sites.Available evidence is inadequate to predict whether Russia’s intelligence services or armed forces would attack U.S. networks. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * “Russia’s armed forces, collaborating with experts in the IT sector and academic community, have developed a robust cyber warfare doctrine… “Information weaponry,” i.e., weapons based on programming code, receives paramount attention in official cyber warfare doctrine. Moscow also has a track record of offensive hacking into Chechen Web sites.” “Although we assess it likely that Moscow will continue to scout U.S. military and private sector networks and Web sites, available evidence is inadequate to predict whether Russia’s intelligence services or armed forces would attack U.S. networks.”* © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Future TrendsPositive TrendsCyberterrorism Preparedness Act
  • 14. of 2002$350,000,000 over 5 years for improving network securityCybersecurity Research and Education Act of 2002$50,000,000 over 4years for training IT specialists in IT security © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Do you think that’s enough money? © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Future Trends (cont.)Negative Trends Rand report on cyber terrorism © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Possible attacks on chemical plants, water supplies, or power supplies resulting in massive casualties, rather than simply economic damage. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Defense Against Cyber TerrorismRecommendations for preparing for and protecting against cyber terrorism includeA Manhattan Project-level programResearch and academic programs dedicated to securityComputer crime treated more
  • 15. seriously © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Defense Against Cyber Terrorism (cont.)Every police department must have access to computer crime specialists.Security professionals must have a forum to report and discuss emergencies. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * TORHow it worksIllegal Markets © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * Do you think that’s enough money?
  • 16. © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare * SummaryThere are various forms of cyber terrorist attacks across all industries.Many experts believe it is a credible threat.How could your computer systems be used against you and your company? © 2012 Pearson, Inc. Chapter 12 Cyber Terrorism and Information Warfare *