Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber threats


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Cyber threats

  1. 1. 1Cyber Threats
  2. 2.  At the end of this lesson, the student should be able to:  Define cyberterrorism and cyberwarfare;  Identify five types of cyber attacks and understand the damage that cyber attacks can inflict;  Discuss several recent examples of cyber attacks;  Identify and explain the roles of two organizations involved in defending US cyberspace. Counterintelligence 2
  3. 3. “The use of computer networks to shut down critical infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Source: Center for Strategic and International Studies) Cyber Threats 3
  4. 4.  Information war “The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories.” (Source: American Heritage New Dictionary) Cyber Threats 4
  5. 5.  Trojan Horse: A computer program that conceals harmful code. A Trojan horse usually masquerades as a useful program that a user would wish to execute. Virus: A program that infects computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to affect other files. Unlike a computer worm, a virus requires human involvement (usually unwitting) to propagate. Cyber Threats 5
  6. 6.  Phishing: Using emails and websites designed to look like those of legitimate businesses/government agencies to deceive internet users into disclosing personal data, e.g. bank and financial account information and passwords. DoS (Denial of Service): A method of attack from a single source that denise system access to legitimate users by overwhelming the target computer with messages and blocking legitimate traffic. It can prevent a system from being able to exchange data with other systems of use the internet. Cyber Threats 6
  7. 7.  Distributed Denial of Service (DDoS): A variant of the DoS attack that uses a coordinated attack from a distributed system of computers rather than from a single source. It often makes use of worms to spread to multiple computers that can then attack the target. Counterintelligence 7
  8. 8. Titan Rain (2003+) Series of coordinated attacks on US computers Thought to be Chinese in origin NASA, Lockheed Martin, and other vital organizations penetrated Counterintelligence 8
  9. 9. Estonia, April 2007 DDoS attack against Estonian banks, media and government Coincided with major civil unrest by Russian nationals Cyber Threats 9
  10. 10. GhostNet Chinese cyberespionage network At least 103 countries penetrated Searches computers and emails, then turns on webcams and microphones to record any conversations within range Counterintelligence 10
  11. 11. Cyber Threats 11
  12. 12.  Created in 2006 Housed within DHS “responsible for enhancing the security, resiliency, and reliability of the nations cyber and communications infrastructure” Counterintelligence 12
  13. 13.  Created in June 2009 Began operations in May 2010 Part of the US Strategic Command, involving military units from the US Army, Navy, Air Force and Marines Directed by General Keith B. Alexander (also head of NSA) Cyber Threats 13
  14. 14. Plans, coordinates, integrates,synchronizes and conductsactivities to: Direct the operations and defense of specified DoD information networks Prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.Counterintelligence 14
  15. 15.  Spy Museum Interviews: spy/spycast  November 1, 2009 interview features Melissa Hathaway, former senior director for cyberspace for the National Security Council  June 15, 2009 interview features Dr. Terry Gudaitis, former CIA operations officer and president of cyber intelligence company Cyveillance } for more on securing } shared cyber networks Cyber Threats 15