document on cyber terrorism


Published on

Published in: News & Politics
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

document on cyber terrorism

  1. 1. Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyber terrorism is defined by the Technolytics Institute as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives."INTRODUCTION :<br /> <br />If cyber terrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure. <br /><ul><li>DIFFERENCE BETWEEN REAL WORLD PHYSICAL TERRORISM AND CYBER TERRORISMChances of capture, injury, or death to a cyber terrorist are lessCyber terrorism is difficult to track Easy to accomplish due to lack of understanding of security risksIt can also include attacks on Internet business, but when this is done for economic motivations rather than ideological, it is typically regarded as cybercrime.
  2. 2. Dependence on Network Infrastructure and the InternetLack of Understanding of Security RisksLack of Funding for Adequate Network Security ToolsDifficulty in tracking the Cyber terrorist
  3. 3. Credit Card Number Theft People are using credit cards for more and more of their purchases as time goes on.. Credit cards are especially easy to use fraudulently, because they require no extra identification number to use. Electronic CashWe are already well on the way to a cash-free society. People now use ATM cards, credit cards, and check-cards for a large percentage of their purchasing. As we move further from a paper-money society, to a purely electronic economy, new types of crime will emerge as accessing these is quite easier. All we can be sure of, is that criminals of tomorrow, like those of last century and those of today, will keep on innovating. This is because, as a system advances, so does the criminals. All that a thief needs is pure information-they don't need the card, but just the number on the card. Information theft Minor attacks come in the form of "data diddling", where information in the computer is changed. This may involve changing medical or financial records or stealing of passwords. Hackers may even prevent users who should have access from gaining access to the machine. Ethical issues in this case include things like invasion of privacy and ownership conflicts.</li></ul>4. Hacking Hacking is basically knowing programmable systems and how they work. Some agencies hire hackers to show them the downfalls in their security system so they can improve it against hackers that want information or access into the computer for other reasons. Hacking is a form of art for some people .But generally , it is being used adversely. One of the popular terror act is to threaten a large bank.<br />The terrorism matrix<br />When terrorism is examined in view of these definitions, there are some pervasive elements: people<br />(or groups), locations (of perpetrators, facilitators, victims), methods/modes of action; tools, targets,<br />affiliations, and motivations2. Examples are shown in Figure 1, using two groups designated as terrorist<br />groups by the United States government: The Liberation Tigers of Tamil Eelam (LTTE) and the Aum.<br />Matrix of terrorism with inclusion of the computer.LTTE AUMPerpetratorGroup/IndividualGroup/IndividualPlaceSri Lanka/London/Australia/WorldwideJapan/US/WorldwideActionThreats/Violence/Recruitment/Education/StrategiesViolence/Recruitment/Education/StrategiesToolKidnapping/Harassment/Propaganda/EducationNerve Gas/EducationTargetGovernment Officials/Recruits!=AUMAffiliationActual/ClaimedActual/ClaimedMotivationSocial/Political ChangeWorld DominationMATRIX BY GROUP AND ATTRIBUTE LTTEAUMPerpetratorGroupGroupPlaceSrilankaJapanActionThreats/ViolenceViolenceToolKidnapping/HarassmentNerve GasTargetGovernment Officials/Recruits!=AUMAffiliationActual/ClaimedActual/ClaimedMotivationSocial/Political ChangeWorld Domination<br /> In this model, not all of the elements are congruent with functional tasks assigned to given agencies. Thus, ‘terrorism’ can take place within these same groups that is not within the scope of investigation, etc. This is clearly a major problem, and one that merits further investigation. Therefore, let us look very briefly at the various sorts of issues the inclusion of computers introduce to the concept of terrorism.<br />Crackers -A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. White Hat Hackers – Hackers who break into computers. They have no right to access but they often report the security leaks to the victims. Script bunnies -    People who would like to be hackers but don’t have much technical expertise. They download click-and-point software that automatically does the hacking for them. <br />In 2001 ,12 billion dollars in losses due to security breaches, virus attacks and hacked networkThe NIMDA virus alone accounted for 2 billion dollars in lossesThe Mydoom virus sent 100 million infected e-mails in the first 36 hours, and accounted for roughly a quarter of global e-mail traffic on Jan. 26, 2004. The pessimists claim that cyber attacks cost $10-$15 billion per year and would cost tens of billions more to fix, the optimists claim that all cyber crime over a five year period cumulatively cost only $1 billion and fixing the current vulnerabilities would only cost $4-$5 billion more.<br /> <br />FRAMEWORK FOR CYBER ATTACKS:<br />AttacksPhysical AccessAttacks--WiretappingServer HackingVandalismDialog Attacks--EavesdroppingImpersonationMessage AlterationPenetrationAttacksSocial Engineering--Opening AttachmentsPassword TheftInformation TheftScanning(Probing)Break-inDenial ofServiceMalware--VirusesWorms<br />REFERENCES:<br /><br /><br /><br /><br /><br /><br /><br /><br /><br />ACKNOWLEDGEMENTS:<br />Designing this poster required the efforts of many people. Therefore, I would like to take this opportunity to thank many of those who gave their valuable time and suggestions.<br />Firstly I would thank Mr. Surendra Kumar Yadav (HOD, CS&IT dept. JNIT) for providing his support and appreciation to the work.<br />Next I would thank Mr. Vijay Mohan Shrimal and Mr. Madhav Sharma (Faculty, CS&IT, JNIT) for providing their incredible support and suggestions while working on this poster,<br />Last but not the least I would thank all of my friends and co-mates for their help and support.<br />The authors would like to thank Jagan Nath Gupta Institute of Engineering and Technology for his valuable advice, support and guidance during the preparation of this paper.<br />OBJECTIVE:<br />The poster presents all about the cyber terrorism. It has had relatively wide impact on the cyber network, due to the substantial investment it is required to develop security measures. This has radically changed over the last years due to the technological advancements in the industry. Many organizations like FBI, OPSEC, NATO etc. are working to prevent the network from cyber attacks. <br />CONCLUSION:<br />It is impossible to ignore the fact of how extreme cyber terrorism can and will be in the future to come. Cyber terrorism may be more preventable than actual physical attacks on cities, civilians and other countries. To combat with cyber terrorism we require more diligence and cooperation with countries and allies. We should be doing the reliance on automation and less human intervention which could open the doors for future attacks.<br /> <br /> <br /> <br />