This PowerPoint presentation will describe the basic concepts on how you can protect yourself from cyber-terror. Also, it will talk about the current issues of cyber-terrorism.
Relationship Between International Law and Municipal Law MIR.pdf
Current issues on cyber terror presentation
1. Current Issues and Concepts on
Cyber Terror
Brian Cardenas
03/1/2015
Arizona Western College (AJS 200-700)
2. Paul Wilkinson (1976): Terrorist
Typologies -Concepts
Four Types of Terrorism
• Criminal: Defined as the
planned use of terror for
financial and material gain.
EX: Drug Cartels
• Psychic: Terrorism related to
magical beliefs, myths, and
superstitions induced by
fanatical religious beliefs.
• War: The annihilation of the
enemy through whatever
means possible.
• Political: Political -Systematic
use of violence and fear to
achieve a political objective.
3. Current Issues regarding Cyber
Terrorism
On December 24, 2014 the United States
was facing a big debate about the
released of the movie: “The Interview”
by James Franco & Seth Rogen.
• A group of Korean hackers, hacked the
entire FBI website by publishing an
embarrassing video in the website.
• The reason why the FBI website got
hacked was because the North Korean
government felt that the film hurt the
dignity of its supreme leader Kim
Jong-un
• Also, the Korean group made threats
of violence if the movie was release in
any format. That is the reason why
the movie The Interview wasn’t
released and cancelled from all
American theaters.
7. 5 steps: How To Protect Yourself
From Cyber-Terror
1. All accounts should have passwords and the
passwords should be unusual, difficult to guess.
2. Change the network configuration when defects
become know.
3. Check with venders for upgrades and patches.
4. Audit systems and check logs to help in
detecting and tracing an intruder
5. If you are ever unsure about the safety of a site,
or receive suspicious email from an unknown
address, don't access it. It could be trouble.
8. Reference
• Sperber, B. (2012, May 23). Solutions Emerge to Prevent Control
System Cyber-Attacks. Retrieved March 1, 2015, from
http://www.automationworld.com/security/solutions-emerge-prevent-
control-system-cyber-attacks
• Sproles, J., & Byars, W. (1998, January 1). Statistics On Cyber-
terrorism. Retrieved March 1, 2015, from
http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm
• Sproles, J., & Byars, W. (1998, January 1). Cyber-terrorism. Retrieved
March 1, 2015, from
http://csciwww.etsu.edu/gotterbarn/stdntppr/#Protect
• Passeri, P. (2012, June 10). May 2012 Cyber Attacks Statistics.
Retrieved March 1, 2015, from
http://hackmageddon.com/2012/06/10/may-2012-cyber-attacks-
statistics/
• Wallace, H. (2014). Concepts of Terrorism. In Victimology: Legal,
Psychological, and Social Perspectives (4th ed.). Fresno, California:
MC Graw Hill Education.
Editor's Notes
This PowerPoint presentation will talk about the current issues and Concepts on cyber terror. Also, it will describe couple of methods on how cyber attacks can be prevent it.
According to the text book “Victimology: Legal, Psychological, and Social Perspectives” by Harvey Wallace mentioned “Paul Wilkinson is a Terrorist Typologies and he stated very important concepts regarding cyber terrorism.” (Wallace, 2014)
According to the article, "The Interview: Sony's North Korea Film to be Screened in US" by BBC News Entertainment, stated “the main reason why the movie The Interview turned out to be an issue so the U.S. had to cancelled its release because the North Korean government felt that the film hurt the dignity of its supreme leader.” (BBC News, 2014)
According to the article “Solutions Emerge to Prevent Control System Cyber-Attacks” by By Bob Sperber a (Special Projects Editor) “spell-out six specific steps and strategies to fend-off cyber attacks.” (Sperber, 2012)
According to the article “Statistics On Cyber-terrorism” by Jimmy Sproles & Will Byars stated “military installations, power plants, air traffic control centers, banks and telecommunication networks themselves are most like the one’s who are attack by cyber-terror.” (Sproles & Byars, 1998) Also, the author stated who are the terrorist.
“The graphic shows that amateur hackers are by far the biggest threat on the Internet at the current time with a 90% of all hacking activities.” (Sproles & Byars, 1998)
According to the “Distribution of Targets of May 2012” by Paolo Passeri described the government is the most likely agency that suffers attacks from cyber-terror. (Passeri, 2012)
This “6 steps: How to Protect yourself from Cyber Terror” were revealed by Jimmy Sproles & Will Byars.