SlideShare a Scribd company logo
What is it? And what is its importance?
Cyber-Warfare:

       ▪ is the use of computers and the Internet in
         conducting warfare in cyberspace.




       V.S.
    Information Security:

       ▪ protecting information and information systems from unauthorized
         access, use, disclosure, disruption, modification or destruction.
The ACTUAL tools used in Information Security
Rand Report 1970



    MULTICS



    Computer Viruses, Worms, and Trojan Horses



    Anti-virus Software



    Encryption/Decryption

How much does Google really know about you?
What you are searching for
1.
     What web pages you visit
2.
     What blogs you read – Google Reader
3.
     Your financial information – AdSense /
4.
     Google Checkout
     Strength / Popularity of your website –
5.
     Google Analytics / Google Page Creator
6. Who and what you’re emailing –
  Gmail
7. What’s on your PC – Google Desktop
8. Your research paper, bills, etc. –
  uploading documents to Google
9. Your schedule – Google Calendar
10. Your social network and interests –
  Google indexes
  (Orkut, Facebook, Digg)
11. When you’re going to get the flu – Google
  flu tracker
12. Where you and your friends are – Google
  Latitude / Google Maps
13. What you’re watching on You Tube –
  Google owns You Tube
14. What and where you study – Google
  Books, Scholar, and University
15. Everything you’re looking at online –
  Google Chrome
16. Your problems – searching Google
 for answers
17. Your medical issues – Google Health
18. Your home address – Google
 Maps, AdSense, or Checkout
19. Mobile number – SM, Google
 Mobile, and Gmail
20. How your voice sounds – Google Talk
21. What you, your friends and family look
  like and do – Picasa
22. Everything you do online – Google Secure
  Access encrypts your data
23. What you want to buy and have bought –
  product search and catalog
24. What you business is about – Adwords
  share information with Google
25. What’s important to you – Google Alerts
Against Video Privacy Act?

 Every video on You Tube, the judge required
  Google to turn over to Viacom the login name of
  every user who had watched it and the address
  of their computer (IP)
 Viacom claims information will be safeguarded
  and will be used only to press charges against
  Google ($1 billion copyright suit)
 Public afraid of information being used against
  them
Identity Theft / Stalker / Target Ads

     Full name
     Hometown
     School
     Class schedule
     Email
     Phone Number
     Picture
     Religion
     Activities / Interests
150 million users

    Businesses can look at your Facebook

    Check privacy settings

    http://news.bbc.co.uk/2/hi/technology/737

    6738.stm
Doomsday April 1st?

    Conficker is a computer worm that exploits

    the weaknesses in Microsoft’s Windows
    12 million machines infected with software

    code that will connect the infected machine
    it controls to a powerful computer known as
    botnet
    Microsoft announces a $250,000 reward for

    information leading to the capture of the
    Conficker author
“Perhaps the most obvious frightening aspect of
  Conficker is its clear potential to do harm.
  Perhaps in the best case, Conficker may be
  used as sustained and profitable platform for
  massive Internet fraud and theft. In the worst
  case, Conficker could be turned into a powerful
  offensive weapon for performing concerted
  information warfare attacks that could disrupt
  not just countries, but the Internet itself.”
                   Phillip Porras
                 -
      Research Director at SRI International
Cyber Terrorism
Cyber Warfare:

     The term cyber-warfare has many manifestations, ranging
      between website vandalism, iWar (information
      warfare), to destroying a country's critical infrastructure!
    Government Vulnerability:

     Large dependency on information platforms linked to the
      internet. Such as power
      grids, water, fuel, communications, and public
      transportation. They are all vulnerable to a cyber attack.
           An example that highlights this is the Russian-Georgian war in 2008.
    Cyber Warfare still a relatively new type of war. Most

    of the research is based on “potential-harm”.
Cyber-war highlights:

      ▪ Jordan's’ Techno power:
             Those involved in cyber warfare have a vast amount of techno power. As
              these “hackers” can destroy a country from inside out in a short time, and
              with complete anonymity. The true manifestation of “power”. Or they can
              manipulate any corporation, steal money, the limits are endless. They can
              access anythign connected to cyber space.
      ▪ Marvin’s Experts:
             The experts that can engage in cyber warfare are put above all others in
              the realm of the internet.
    Why?

      ▪   Because they can.
      ▪   Power
      ▪   Contracted.
      ▪   Can sell skills to terrorist groups or governments for money.
As the Internet becomes more pervasive in all areas of

    human endeavor, individuals or groups can use the
    anonymity afforded by cyberspace to threaten
    citizens, specific groups (i.e. with membership based on
    ethnicity or belief), communities and entire
    countries, without the inherent threat of capture, injury, or
    death to the attacker that being physically present would
    bring.

    Leveraging of a target's computers and

    information, particularly via the Internet, to cause
    physical, real-world harm or severe disruption of
    infrastructure.
The targets usually consisted of normal individual

    internet users 10 – 15 years ago. Now targets can be
    countries, large corporations, etc; as society became
    more “digital”.
    Are only developed countries open to attack?

      ▪ Yes, the more developed countries are susceptible to cyber warfare.
        As most of the foundations of the country and population lie within
        the realms of communication based in cyberspace.
      ▪ Lesser developed countries can be effected just as much. Although
        it won’t hit the general population as hard.
    Future wars and terrorism will look to manipulate and

    target foundations with no losses.
On May 17, 2007 Estonia came under cyber attack. The

    Estonian parliament, ministries, banks, and media were
    targeted.
    On first week of September 2007, The Pentagon and

    various French, German and British government
    computers were attacked by hackers of Chinese origin.
    The Chinese government denies any involvement
    Georgian and Azerbaijani sites were attacked by hackers

    during the 2008 South Ossetia War.
    The United States had come under attack from computers

    and computer networks situated in China and Russia.
Cyber-warfare is still developing. Small attacks have been made

    and attempted, but there hasn’t been a “large-scale” cyber war.
    Still a war-type of the near future.
The following examples are just potential threats:
    Can cripple a country

      ▪   Inhibit or stop all communication that uses any technological medium
      ▪   Could take control of power, water, and other necessities
      ▪   Confidential documents/plans stolen
      ▪   Total Control over most technological platforms (including nuclear codes and
          access)…

    Cyber warfare in media: (Somewhat possible damages if it were to

    occur on a large scale)
      ▪ Eagle Eye
      ▪ Die Hard 4
http://delicious.com/acallon



    http://delicious.com/JulesRoa



    http://delicious.com/gfisk


More Related Content

What's hot

Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
Elyssa Durant
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
sherrysher82
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
Priyanka Aash
 

What's hot (20)

Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 

Viewers also liked

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (9)

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Clt3328fisk

"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
Write My Paper One Day Mercy College
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vasiliki Zioga
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
Custom Paper Services
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Shojan Jacob
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Buy A Paper Gallatin
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
Felipe Prado
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
blogzilla
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
blogzilla
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
Help With Papers Tacoma
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
Luckeylama
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Aditya Singh Rana
 

Similar to Clt3328fisk (20)

Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 

Clt3328fisk

  • 1. What is it? And what is its importance?
  • 2. Cyber-Warfare:  ▪ is the use of computers and the Internet in conducting warfare in cyberspace. V.S. Information Security:  ▪ protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
  • 3. The ACTUAL tools used in Information Security
  • 4.
  • 5. Rand Report 1970  MULTICS  Computer Viruses, Worms, and Trojan Horses  Anti-virus Software  Encryption/Decryption 
  • 6. How much does Google really know about you?
  • 7. What you are searching for 1. What web pages you visit 2. What blogs you read – Google Reader 3. Your financial information – AdSense / 4. Google Checkout Strength / Popularity of your website – 5. Google Analytics / Google Page Creator
  • 8. 6. Who and what you’re emailing – Gmail 7. What’s on your PC – Google Desktop 8. Your research paper, bills, etc. – uploading documents to Google 9. Your schedule – Google Calendar 10. Your social network and interests – Google indexes (Orkut, Facebook, Digg)
  • 9. 11. When you’re going to get the flu – Google flu tracker 12. Where you and your friends are – Google Latitude / Google Maps 13. What you’re watching on You Tube – Google owns You Tube 14. What and where you study – Google Books, Scholar, and University 15. Everything you’re looking at online – Google Chrome
  • 10. 16. Your problems – searching Google for answers 17. Your medical issues – Google Health 18. Your home address – Google Maps, AdSense, or Checkout 19. Mobile number – SM, Google Mobile, and Gmail 20. How your voice sounds – Google Talk
  • 11. 21. What you, your friends and family look like and do – Picasa 22. Everything you do online – Google Secure Access encrypts your data 23. What you want to buy and have bought – product search and catalog 24. What you business is about – Adwords share information with Google 25. What’s important to you – Google Alerts
  • 12. Against Video Privacy Act?   Every video on You Tube, the judge required Google to turn over to Viacom the login name of every user who had watched it and the address of their computer (IP)  Viacom claims information will be safeguarded and will be used only to press charges against Google ($1 billion copyright suit)  Public afraid of information being used against them
  • 13. Identity Theft / Stalker / Target Ads   Full name  Hometown  School  Class schedule  Email  Phone Number  Picture  Religion  Activities / Interests
  • 14. 150 million users  Businesses can look at your Facebook  Check privacy settings  http://news.bbc.co.uk/2/hi/technology/737  6738.stm
  • 15. Doomsday April 1st?  Conficker is a computer worm that exploits  the weaknesses in Microsoft’s Windows 12 million machines infected with software  code that will connect the infected machine it controls to a powerful computer known as botnet Microsoft announces a $250,000 reward for  information leading to the capture of the Conficker author
  • 16. “Perhaps the most obvious frightening aspect of Conficker is its clear potential to do harm. Perhaps in the best case, Conficker may be used as sustained and profitable platform for massive Internet fraud and theft. In the worst case, Conficker could be turned into a powerful offensive weapon for performing concerted information warfare attacks that could disrupt not just countries, but the Internet itself.” Phillip Porras - Research Director at SRI International
  • 18. Cyber Warfare:   The term cyber-warfare has many manifestations, ranging between website vandalism, iWar (information warfare), to destroying a country's critical infrastructure! Government Vulnerability:   Large dependency on information platforms linked to the internet. Such as power grids, water, fuel, communications, and public transportation. They are all vulnerable to a cyber attack.  An example that highlights this is the Russian-Georgian war in 2008. Cyber Warfare still a relatively new type of war. Most  of the research is based on “potential-harm”.
  • 19. Cyber-war highlights:  ▪ Jordan's’ Techno power:  Those involved in cyber warfare have a vast amount of techno power. As these “hackers” can destroy a country from inside out in a short time, and with complete anonymity. The true manifestation of “power”. Or they can manipulate any corporation, steal money, the limits are endless. They can access anythign connected to cyber space. ▪ Marvin’s Experts:  The experts that can engage in cyber warfare are put above all others in the realm of the internet. Why?  ▪ Because they can. ▪ Power ▪ Contracted. ▪ Can sell skills to terrorist groups or governments for money.
  • 20. As the Internet becomes more pervasive in all areas of  human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Leveraging of a target's computers and  information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
  • 21. The targets usually consisted of normal individual  internet users 10 – 15 years ago. Now targets can be countries, large corporations, etc; as society became more “digital”. Are only developed countries open to attack?  ▪ Yes, the more developed countries are susceptible to cyber warfare. As most of the foundations of the country and population lie within the realms of communication based in cyberspace. ▪ Lesser developed countries can be effected just as much. Although it won’t hit the general population as hard. Future wars and terrorism will look to manipulate and  target foundations with no losses.
  • 22. On May 17, 2007 Estonia came under cyber attack. The  Estonian parliament, ministries, banks, and media were targeted. On first week of September 2007, The Pentagon and  various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies any involvement Georgian and Azerbaijani sites were attacked by hackers  during the 2008 South Ossetia War. The United States had come under attack from computers  and computer networks situated in China and Russia.
  • 23. Cyber-warfare is still developing. Small attacks have been made  and attempted, but there hasn’t been a “large-scale” cyber war. Still a war-type of the near future. The following examples are just potential threats: Can cripple a country  ▪ Inhibit or stop all communication that uses any technological medium ▪ Could take control of power, water, and other necessities ▪ Confidential documents/plans stolen ▪ Total Control over most technological platforms (including nuclear codes and access)… Cyber warfare in media: (Somewhat possible damages if it were to  occur on a large scale) ▪ Eagle Eye ▪ Die Hard 4
  • 24. http://delicious.com/acallon  http://delicious.com/JulesRoa  http://delicious.com/gfisk 