SlideShare a Scribd company logo
CYBER TERRORISM 
By 
S. Sai Praveen Seva 
12761A0551
OVERVIEW 
•Terms 
•Cyber-terrorists 
•Why cyber-terrorism 
•Forms of cyber-terrorism 
•Impact 
•Effects 
•Examples 
•Conclusion
TERMS 
•Cyber terrorism – The use of the Net for 
terrorism. 
•Cyber crime – The use of the Net for criminal 
actions. 
•Cyber Attacks – Email bombs, viruses, intentional 
actions. 
•Information Warfare – Formalized governmental 
warfare 
•Techno Terrorism – Use of technology by terrorist 
groups
CYBER-TERRORISTS 
An individual that uses 
computernetwork technology (i.e., 
networks, computers, Internet) to 6-9- 
cause intense fear; one who uses 
computernetwork technology to 
control, dominate, or coerce through 
the use of terror in furtherance of 
political or social objectives.
• Cyber terrorist prefer using the cyber attack 
methods because of many advantages for it
• It is cheaper than traditional 
methods
• The action is very difficult to be tracked
• They can hide their personalities and location
• There are no physical barries or check to 
cross
• Big targets can be attacked 
• The tremendous, nole computer 
stimulated crimals and terrorists 
to make it their prefered tool for 
attacking targets
Forms of CYBER-TERRORISM 
1.Privacy Violation: 
•The law of privacy is the 
recognition of the 
individual's right to be let 
alone and to have his 
personal space inviolate. 
•Man has become sensitive 
to publicity.
2.Secret information appropriation and data theft: 
•Information technology 
misuses the data of 
private individuals 
•A computer network 
owned by the 
Government may contain 
valuable information 
concerning defence and 
other top secrets.
3.Distributed denial of Service 
Attack 
•The cyber terrorists may also use 
the method of distributed denial 
of services (DDOS) to 
overburden the Government and 
its agencies electronic bases. 
•This is made possible by first 
infecting several unprotected 
computers by way of virus 
attacks and then taking control of 
them.
4.Network Damage and Disruption: 
•This activity may divert 
the attention of the 
security agencies for the 
time being thus giving 
the terrorists extra time 
and makes their task 
comparatively easier.
What would the Impact be? 
The intention of a cyber terrorism attack could range from 
economic disruption through the interruption of financial 
networks and systems or used in support of a physical 
attack to cause further confusion and possible delays in 
proper response 
1.Direct Cost Implications. 
2.Indirect Cost Implications.
Terrorists Groups
Sample Nuclear Launch 
While Under Cyber Attack
Effects 
•Cyber terrorism can have a serious large-scale 
influence on significant number of people. 
•It can weaken countries' economy greatly, thereby 
stripping it of its resources and making it more 
vulnerable to military attack.
Cyberspace 
The New Realm of 
Warfare
Examples 
•Terrorists in Romania gained access to the 
computers controlling the life support systems at an 
Antarctic research station, endangering the 58 
scientists involved. 
•The official web site of the Presidential Palace of 
Afghanistan was affected by a DOS attack that 
rendered it inaccessible.
• The internet has provided 
a virtual war for countries 
having problems with 
other such. 
* As taiwan against 
China. 
* Israel against Palestine. 
*India against pakistan, 
China
What does a terrorist group achieve with a 
cyber attack that they can’t with a 
conventional attack?
Attacks are doubling each year
How can we protect ourselves? 
•All accounts should have passwords and the 
passwords should be unusual, difficult to guess 
•Change the network configuration when defects 
become visible 
•Audit systems and check logs to help in detecting 
and tracing an intruder 
•If you are ever unsure about the safety of a site, or 
receive suspicious email from an unknown address, 
don't access it
CONCLUSION 
• After a close look at some of the facts, I have come 
to the these conclusions. Some of my conclusions 
point to the fact that Cyberterrorism could be an 
actually threat. But the other part is that there is too 
much media hype created around the possiblity of a 
Cyberterrorism.
Cyber Terrorism

More Related Content

What's hot

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Namrata Raiyani
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mazhar Nazik
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC

What's hot (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 

Viewers also liked

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
Shaan Yaduvanshi
 
Future of Cyber Terrorism
Future of Cyber TerrorismFuture of Cyber Terrorism
Future of Cyber Terrorism
Maurice Dawson
 
Terrorism preparedness and response
Terrorism preparedness and responseTerrorism preparedness and response
Terrorism preparedness and response
Amb Steve Mbugua
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...
E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...
E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...
IAALD Community
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
anjalika sinha
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & TerrorismFizza Rizvi
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Prav_Kalyan
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
sudheerreddy59
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Ppt on terrorism
Ppt on terrorismPpt on terrorism
Ppt on terrorism
shivani reddy
 

Viewers also liked (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 
Future of Cyber Terrorism
Future of Cyber TerrorismFuture of Cyber Terrorism
Future of Cyber Terrorism
 
Terrorism preparedness and response
Terrorism preparedness and responseTerrorism preparedness and response
Terrorism preparedness and response
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...
E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...
E-Agriculture:From Cutlass to Cutting Edge - Practical Solutions for the Know...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & Terrorism
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Ppt on terrorism
Ppt on terrorismPpt on terrorism
Ppt on terrorism
 

Similar to Cyber Terrorism

Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
Computer Forensics
Computer ForensicsComputer Forensics
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
DrPraveenKumar37
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
Aditya Singh Rana
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
C3 Cyber
C3 CyberC3 Cyber
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 

Similar to Cyber Terrorism (20)

Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 

Recently uploaded

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 

Recently uploaded (20)

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 

Cyber Terrorism

  • 1. CYBER TERRORISM By S. Sai Praveen Seva 12761A0551
  • 2. OVERVIEW •Terms •Cyber-terrorists •Why cyber-terrorism •Forms of cyber-terrorism •Impact •Effects •Examples •Conclusion
  • 3. TERMS •Cyber terrorism – The use of the Net for terrorism. •Cyber crime – The use of the Net for criminal actions. •Cyber Attacks – Email bombs, viruses, intentional actions. •Information Warfare – Formalized governmental warfare •Techno Terrorism – Use of technology by terrorist groups
  • 4. CYBER-TERRORISTS An individual that uses computernetwork technology (i.e., networks, computers, Internet) to 6-9- cause intense fear; one who uses computernetwork technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.
  • 5.
  • 6. • Cyber terrorist prefer using the cyber attack methods because of many advantages for it
  • 7. • It is cheaper than traditional methods
  • 8. • The action is very difficult to be tracked
  • 9. • They can hide their personalities and location
  • 10. • There are no physical barries or check to cross
  • 11. • Big targets can be attacked • The tremendous, nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets
  • 12. Forms of CYBER-TERRORISM 1.Privacy Violation: •The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. •Man has become sensitive to publicity.
  • 13. 2.Secret information appropriation and data theft: •Information technology misuses the data of private individuals •A computer network owned by the Government may contain valuable information concerning defence and other top secrets.
  • 14. 3.Distributed denial of Service Attack •The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. •This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them.
  • 15. 4.Network Damage and Disruption: •This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier.
  • 16. What would the Impact be? The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems or used in support of a physical attack to cause further confusion and possible delays in proper response 1.Direct Cost Implications. 2.Indirect Cost Implications.
  • 18. Sample Nuclear Launch While Under Cyber Attack
  • 19. Effects •Cyber terrorism can have a serious large-scale influence on significant number of people. •It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.
  • 20. Cyberspace The New Realm of Warfare
  • 21. Examples •Terrorists in Romania gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved. •The official web site of the Presidential Palace of Afghanistan was affected by a DOS attack that rendered it inaccessible.
  • 22. • The internet has provided a virtual war for countries having problems with other such. * As taiwan against China. * Israel against Palestine. *India against pakistan, China
  • 23. What does a terrorist group achieve with a cyber attack that they can’t with a conventional attack?
  • 24. Attacks are doubling each year
  • 25. How can we protect ourselves? •All accounts should have passwords and the passwords should be unusual, difficult to guess •Change the network configuration when defects become visible •Audit systems and check logs to help in detecting and tracing an intruder •If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it
  • 26. CONCLUSION • After a close look at some of the facts, I have come to the these conclusions. Some of my conclusions point to the fact that Cyberterrorism could be an actually threat. But the other part is that there is too much media hype created around the possiblity of a Cyberterrorism.