Emerging threats of cyberterrorism

781 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
781
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
49
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Emerging threats of cyberterrorism

  1. 1. EMERGING THREATS OFCYBERTERRORISM“Tomorrows terrorist may be able to do more with akeyboard then with bomb”
  2. 2. INTRODUCTIONDistribution Denial of Service attack, disrupting services,DNS attacks, uploading computer viruses, worms andmalwares, harassing individuals and companies,fraudulent transactionsJust examples of whathacktivist can do with just acomputer and internetconnectionInternet now offers genuine targets that will becomeattractive to certain terrorist organisations.In today’s world, computer, aninternet connection and few well-aimed clicks can lead tocyberterrorism.
  3. 3. Terrorism refer only to those violent acts which are intendedto create fear (terror); are perpetrated for areligious, political or, ideological goal; and deliberately targetor disregard the safety of civilians.Cyberspace refers to the global network of independentinformation technology infrastructure, telecommunicationnetworks and computer processing systems in which onlinecommunication takes place.CYBERTERRORISM
  4. 4. DEFININGCYBERTERRORISMCYBERTERRORISM IS THE USE OF INTERNET BASED ATTACKS INTERRORIST ACTIVITIES, INCLUDING LARGE-SCALE DISRUPTING SERVICES,ESPECIALLY PERSONAL COMPUTERS ATTACHED BY INTERNETCONNECTION, BY THE MEANS OF TOOLS SUCH AS COMPUTER VIRUSES,MALWARES, WORMS TROJANS ETC.Cyberterrorims is convergence ofcyberspace and terrorism.To qualify for cyberterrorism, anattack should result in violenceagainst person or property, or atleast cause enough harm togenerate fear.The use of computer network tools toshutdown critical infrastructures like energy,transportation etc. or to coerce or intimidategovernment or civilian population is alsocyberterrorism.
  5. 5. The term cyberterrorism was first coined by BarryCollin in 1980’s by saying “Protect yourself from theCyberterrorism”.Dorothy E. Denning definescyberterrorism as:Unlawful attacks and threats of attack againstcomputers, networks, and the information storedtherein when done to intimidate or coerce agovernment or its people in furtherance of political orsocial objective.
  6. 6. For any hacktivist, it is very cheap, speedy and straightforward to initiate attacksagainst critical infrastructure.Cost of personal computerand internet access Less than a minuteUsing freely availableintruder toolsIt is costly, long term and intricate to take the steps needed to harden theinformation infrastructure to make it less vulnerable to attack, and to facilitate inresponding more effectively and efficiently when attacks do happen.International efforts andfundingResearch, developmentand deploymentTechnically andpolitically
  7. 7. SOME ILLUSTRATIONSIn 1996, a computer hacker allegedly associated with the WhiteSupremacist movement temporarily disabled a Massachusetts ISP anddamaged part of the ISPs record keeping system. The ISP had attemptedto stop the hacker from sending out worldwide racist messages under theISPs name. The hacker signed off with the threat, "you have yet to seetrue electronic terrorism. This is a promise."In 1998, ethnic Tamil guerrillas swamped Sri Lankanembassies with 800 e-mails a day over a two-week period. Themessages read "We are the Internet Black Tigers and weredoing this to disrupt your communications." Intelligenceauthorities characterized it as the first known attack byterrorists against a countrys computer systems.India and Pakistan have emerged in a long-term dispute over Kashmir.The dispute moved into cyberspace when pro-Pakistani hackers beganrepeatedly attacking computers in India.
  8. 8. TOOLS ANDTECHNIQUESCyberterrorism flourishes on the development ofnew technology. New tools and techniques areinvented almost daily for cyberterrorism. Some ofthem are:Viruses, Worms and MalwaresThese are the basic tools for any cyberattack. Hacktivist will hack into systems andupload any virus or worm which can result insystem crash.Internet and downloadedapplications are the majorsources of malwares
  9. 9. Distributed Denial-of-service(DDOS)
  10. 10. Unauthorized InstructionsDomain Name Service (DNS)AttacksPotential Attacks
  11. 11. CONCLUSIONCyberterrorism is evolving concept, and thereis possibility of critical damages toinfrastructure, networks and cyberspace, ifnot taken seriously.Cyberterrorism is a complex issue that is vitalfor information security specialists and to someextent the society to recognize. One must beconscious of all of its characteristics in order tobetter evaluate how and where the terroristsare likely to attack our approach.

×