SlideShare a Scribd company logo
1 of 8
Current Issues and Concepts on
Cyber Terror
Brian Cardenas
03/1/2015
Arizona Western College (AJS 200-700)
Paul Wilkinson (1976): Terrorist
Typologies -Concepts
Four Types of Terrorism
• Criminal: Defined as the
planned use of terror for
financial and material gain.
EX: Drug Cartels
• Psychic: Terrorism related to
magical beliefs, myths, and
superstitions induced by
fanatical religious beliefs.
• War: The annihilation of the
enemy through whatever
means possible.
• Political: Political -Systematic
use of violence and fear to
achieve a political objective.
Current Issues regarding Cyber
Terrorism
On December 24, 2014 the United States
was facing a big debate about the
released of the movie: “The Interview”
by James Franco & Seth Rogen.
• A group of Korean hackers, hacked the
entire FBI website by publishing an
embarrassing video in the website.
• The reason why the FBI website got
hacked was because the North Korean
government felt that the film hurt the
dignity of its supreme leader Kim
Jong-un
• Also, the Korean group made threats
of violence if the movie was release in
any format. That is the reason why
the movie The Interview wasn’t
released and cancelled from all
American theaters.
6 Steps: How to Protect Control
System
WHO ARE THE HACKERS?
Distribution of Targets
May 2012
5 steps: How To Protect Yourself
From Cyber-Terror
1. All accounts should have passwords and the
passwords should be unusual, difficult to guess.
2. Change the network configuration when defects
become know.
3. Check with venders for upgrades and patches.
4. Audit systems and check logs to help in
detecting and tracing an intruder
5. If you are ever unsure about the safety of a site,
or receive suspicious email from an unknown
address, don't access it. It could be trouble.
Reference
• Sperber, B. (2012, May 23). Solutions Emerge to Prevent Control
System Cyber-Attacks. Retrieved March 1, 2015, from
http://www.automationworld.com/security/solutions-emerge-prevent-
control-system-cyber-attacks
• Sproles, J., & Byars, W. (1998, January 1). Statistics On Cyber-
terrorism. Retrieved March 1, 2015, from
http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm
• Sproles, J., & Byars, W. (1998, January 1). Cyber-terrorism. Retrieved
March 1, 2015, from
http://csciwww.etsu.edu/gotterbarn/stdntppr/#Protect
• Passeri, P. (2012, June 10). May 2012 Cyber Attacks Statistics.
Retrieved March 1, 2015, from
http://hackmageddon.com/2012/06/10/may-2012-cyber-attacks-
statistics/
• Wallace, H. (2014). Concepts of Terrorism. In Victimology: Legal,
Psychological, and Social Perspectives (4th ed.). Fresno, California:
MC Graw Hill Education.

More Related Content

Similar to Current issues on cyber terror presentation

SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringJack Kessler
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsCareer Communications Group
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptxBertrandRussell6
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015Numaan Huq
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...mysociety
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 

Similar to Current issues on cyber terror presentation (20)

SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the ExpertsManaging Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Presd1 17
Presd1 17Presd1 17
Presd1 17
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Bully
BullyBully
Bully
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
Preventing Abuse on Facebook During the 2018 US Midterm Elections, Facebook's...
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 

Recently uploaded

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 

Recently uploaded (20)

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 

Current issues on cyber terror presentation

  • 1. Current Issues and Concepts on Cyber Terror Brian Cardenas 03/1/2015 Arizona Western College (AJS 200-700)
  • 2. Paul Wilkinson (1976): Terrorist Typologies -Concepts Four Types of Terrorism • Criminal: Defined as the planned use of terror for financial and material gain. EX: Drug Cartels • Psychic: Terrorism related to magical beliefs, myths, and superstitions induced by fanatical religious beliefs. • War: The annihilation of the enemy through whatever means possible. • Political: Political -Systematic use of violence and fear to achieve a political objective.
  • 3. Current Issues regarding Cyber Terrorism On December 24, 2014 the United States was facing a big debate about the released of the movie: “The Interview” by James Franco & Seth Rogen. • A group of Korean hackers, hacked the entire FBI website by publishing an embarrassing video in the website. • The reason why the FBI website got hacked was because the North Korean government felt that the film hurt the dignity of its supreme leader Kim Jong-un • Also, the Korean group made threats of violence if the movie was release in any format. That is the reason why the movie The Interview wasn’t released and cancelled from all American theaters.
  • 4. 6 Steps: How to Protect Control System
  • 5. WHO ARE THE HACKERS?
  • 7. 5 steps: How To Protect Yourself From Cyber-Terror 1. All accounts should have passwords and the passwords should be unusual, difficult to guess. 2. Change the network configuration when defects become know. 3. Check with venders for upgrades and patches. 4. Audit systems and check logs to help in detecting and tracing an intruder 5. If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it. It could be trouble.
  • 8. Reference • Sperber, B. (2012, May 23). Solutions Emerge to Prevent Control System Cyber-Attacks. Retrieved March 1, 2015, from http://www.automationworld.com/security/solutions-emerge-prevent- control-system-cyber-attacks • Sproles, J., & Byars, W. (1998, January 1). Statistics On Cyber- terrorism. Retrieved March 1, 2015, from http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm • Sproles, J., & Byars, W. (1998, January 1). Cyber-terrorism. Retrieved March 1, 2015, from http://csciwww.etsu.edu/gotterbarn/stdntppr/#Protect • Passeri, P. (2012, June 10). May 2012 Cyber Attacks Statistics. Retrieved March 1, 2015, from http://hackmageddon.com/2012/06/10/may-2012-cyber-attacks- statistics/ • Wallace, H. (2014). Concepts of Terrorism. In Victimology: Legal, Psychological, and Social Perspectives (4th ed.). Fresno, California: MC Graw Hill Education.

Editor's Notes

  1. This PowerPoint presentation will talk about the current issues and Concepts on cyber terror. Also, it will describe couple of methods on how cyber attacks can be prevent it.
  2. According to the text book “Victimology: Legal, Psychological, and Social Perspectives” by Harvey Wallace mentioned “Paul Wilkinson is a Terrorist Typologies and he stated very important concepts regarding cyber terrorism.” (Wallace, 2014)
  3. According to the article, "The Interview: Sony's North Korea Film to be Screened in US" by BBC News Entertainment, stated “the main reason why the movie The Interview turned out to be an issue so the U.S. had to cancelled its release because the North Korean government felt that the film hurt the dignity of its supreme leader.” (BBC News, 2014)
  4. According to the article “Solutions Emerge to Prevent Control System Cyber-Attacks” by By Bob Sperber a (Special Projects Editor) “spell-out six specific steps and strategies to fend-off cyber attacks.” (Sperber, 2012)
  5. According to the article “Statistics On Cyber-terrorism” by Jimmy Sproles & Will Byars stated “military installations, power plants, air traffic control centers, banks and telecommunication networks themselves are most like the one’s who are attack by cyber-terror.” (Sproles & Byars, 1998) Also, the author stated who are the terrorist. “The graphic shows that amateur hackers are by far the biggest threat on the Internet at the current time with a 90% of all hacking activities.” (Sproles & Byars, 1998)
  6. According to the “Distribution of Targets of May 2012” by Paolo Passeri described the government is the most likely agency that suffers attacks from cyber-terror. (Passeri, 2012)
  7. This “6 steps: How to Protect yourself from Cyber Terror” were revealed by Jimmy Sproles & Will Byars.