Cyber Terrorism Presentation

27,440 views

Published on

by Nick Mesina, a student of JUS394 IT & Social Justice, at Arizona State University

Published in: Technology, News & Politics
1 Comment
16 Likes
Statistics
Notes
  • Too hard to read and digest
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
27,440
On SlideShare
0
From Embeds
0
Number of Embeds
147
Actions
Shares
0
Downloads
0
Comments
1
Likes
16
Embeds 0
No embeds

No notes for slide

Cyber Terrorism Presentation

  1. 1. CyberTerrorism JUS 394 Nick Messina
  2. 2. Objective <ul><li>To be able to determine which unlawful acts are actually considered CyberTerrorism. </li></ul><ul><li>The United States’ susceptibility to CyberTerrorism </li></ul>
  3. 3. What is CyberTerrorism? <ul><li>Since the idea of CyberTerrorism is relatively new, its definitions continue to evolve, which is why there is no official definition of CyberTerrorism. </li></ul><ul><li>It varies from… </li></ul><ul><li>Stealing Data and hacking </li></ul><ul><li>Planning terrorist attacks </li></ul><ul><li>Causing violence </li></ul><ul><li>Or attacking information systems </li></ul>
  4. 4. Here are some of those definitions
  5. 5. <ul><li>“…the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political and social objectives (Denning, 2000).” </li></ul>
  6. 6. <ul><li>“… the premeditated, politically motivated attack against information, computer systems, and data which result in violence against noncombatant targets by subnational groups and clandestine agents (Pollitt,2001).” </li></ul>
  7. 7. <ul><li>“ The extent to which cyber-techniques are used for espionage, sabotage, or terrorism (Bronskill, 2001)” </li></ul>
  8. 8. Key Point To Consider <ul><li>How to determine the difference between CyberTerrorism, hacking, and vandalism. </li></ul><ul><li>One major, identifying factor is understand the motivation or intention of the person or group carrying out the attack. </li></ul>
  9. 9. Desmond’s Example <ul><li>Most people would not view a 14-year-old launching a virus as Cyber-Terrorism; However launching a virus attack could easily be viewed as Cyber-Terrorism. </li></ul><ul><li>This is why it is important to consider the intentions and motivations of the person or group launching the attack. </li></ul>
  10. 10. Taking a look at the differences <ul><li>A 14-year-old could be motivated by the desire for attention, the desire to cause trouble, or the desire to prove themselves capable of launching a virus attack. </li></ul><ul><li>The character Zero Coolmovie, Hackers , is an example of this. </li></ul><ul><li>Dade &quot;Zero Cool&quot; Murphy is arrested and charged, at the age of 11, with crashing 1,507 systems in one day and causing a single day 7 point drop in the New York Stock Exchange. </li></ul>
  11. 11. Taking a look at the differences cont. <ul><li>A CyberTerrorist group would most likely have more specific goals or objectives, usually political. </li></ul><ul><li>The movie, Live Free Or Die Hard , is an example of this. </li></ul><ul><li>A terrorist group led by a vindictive, ex government employee, plotted to systematically shut down the United States infrastructure with a plan that consisted of three parts: </li></ul><ul><li>1) Disabling all traffic and transportation hubs/systems </li></ul><ul><li>2) Disrupt financial sectors and telecommunications </li></ul><ul><li>3) Disabling water/electric/ oil utilities, nuclear systems, and anything else tied into computers, </li></ul><ul><li>Notice the specific goals </li></ul>
  12. 12. Just how susceptible is the United States? <ul><li>http:// youtube.com/watch?v =RaQCURNL5rQ </li></ul>
  13. 13. THE END

×