CYBER TERRORISM 
By 
S. Sai Praveen Seva 
12761A0551
OVERVIEW 
•Terms 
•Cyber-terrorists 
•Why cyber-terrorism 
•Forms of cyber-terrorism 
•Impact 
•Effects 
•Examples 
•Conclusion
TERMS 
•Cyber terrorism – The use of the Net for 
terrorism. 
•Cyber crime – The use of the Net for criminal 
actions. 
•Cyber Attacks – Email bombs, viruses, intentional 
actions. 
•Information Warfare – Formalized governmental 
warfare 
•Techno Terrorism – Use of technology by terrorist 
groups
CYBER-TERRORISTS 
An individual that uses 
computernetwork technology (i.e., 
networks, computers, Internet) to 6-9- 
cause intense fear; one who uses 
computernetwork technology to 
control, dominate, or coerce through 
the use of terror in furtherance of 
political or social objectives.
• Cyber terrorist prefer using the cyber attack 
methods because of many advantages for it
• It is cheaper than traditional 
methods
• The action is very difficult to be tracked
• They can hide their personalities and location
• There are no physical barries or check to 
cross
• Big targets can be attacked 
• The tremendous, nole computer 
stimulated crimals and terrorists 
to make it their prefered tool for 
attacking targets
Forms of CYBER-TERRORISM 
1.Privacy Violation: 
•The law of privacy is the 
recognition of the 
individual's right to be let 
alone and to have his 
personal space inviolate. 
•Man has become sensitive 
to publicity.
2.Secret information appropriation and data theft: 
•Information technology 
misuses the data of 
private individuals 
•A computer network 
owned by the 
Government may contain 
valuable information 
concerning defence and 
other top secrets.
3.Distributed denial of Service 
Attack 
•The cyber terrorists may also use 
the method of distributed denial 
of services (DDOS) to 
overburden the Government and 
its agencies electronic bases. 
•This is made possible by first 
infecting several unprotected 
computers by way of virus 
attacks and then taking control of 
them.
4.Network Damage and Disruption: 
•This activity may divert 
the attention of the 
security agencies for the 
time being thus giving 
the terrorists extra time 
and makes their task 
comparatively easier.
What would the Impact be? 
The intention of a cyber terrorism attack could range from 
economic disruption through the interruption of financial 
networks and systems or used in support of a physical 
attack to cause further confusion and possible delays in 
proper response 
1.Direct Cost Implications. 
2.Indirect Cost Implications.
Terrorists Groups
Sample Nuclear Launch 
While Under Cyber Attack
Effects 
•Cyber terrorism can have a serious large-scale 
influence on significant number of people. 
•It can weaken countries' economy greatly, thereby 
stripping it of its resources and making it more 
vulnerable to military attack.
Cyberspace 
The New Realm of 
Warfare
Examples 
•Terrorists in Romania gained access to the 
computers controlling the life support systems at an 
Antarctic research station, endangering the 58 
scientists involved. 
•The official web site of the Presidential Palace of 
Afghanistan was affected by a DOS attack that 
rendered it inaccessible.
• The internet has provided 
a virtual war for countries 
having problems with 
other such. 
* As taiwan against 
China. 
* Israel against Palestine. 
*India against pakistan, 
China
What does a terrorist group achieve with a 
cyber attack that they can’t with a 
conventional attack?
Attacks are doubling each year
How can we protect ourselves? 
•All accounts should have passwords and the 
passwords should be unusual, difficult to guess 
•Change the network configuration when defects 
become visible 
•Audit systems and check logs to help in detecting 
and tracing an intruder 
•If you are ever unsure about the safety of a site, or 
receive suspicious email from an unknown address, 
don't access it
CONCLUSION 
• After a close look at some of the facts, I have come 
to the these conclusions. Some of my conclusions 
point to the fact that Cyberterrorism could be an 
actually threat. But the other part is that there is too 
much media hype created around the possiblity of a 
Cyberterrorism.
Cyber Terrorism

Cyber Terrorism

  • 1.
    CYBER TERRORISM By S. Sai Praveen Seva 12761A0551
  • 2.
    OVERVIEW •Terms •Cyber-terrorists •Why cyber-terrorism •Forms of cyber-terrorism •Impact •Effects •Examples •Conclusion
  • 3.
    TERMS •Cyber terrorism– The use of the Net for terrorism. •Cyber crime – The use of the Net for criminal actions. •Cyber Attacks – Email bombs, viruses, intentional actions. •Information Warfare – Formalized governmental warfare •Techno Terrorism – Use of technology by terrorist groups
  • 4.
    CYBER-TERRORISTS An individualthat uses computernetwork technology (i.e., networks, computers, Internet) to 6-9- cause intense fear; one who uses computernetwork technology to control, dominate, or coerce through the use of terror in furtherance of political or social objectives.
  • 6.
    • Cyber terroristprefer using the cyber attack methods because of many advantages for it
  • 7.
    • It ischeaper than traditional methods
  • 8.
    • The actionis very difficult to be tracked
  • 9.
    • They canhide their personalities and location
  • 10.
    • There areno physical barries or check to cross
  • 11.
    • Big targetscan be attacked • The tremendous, nole computer stimulated crimals and terrorists to make it their prefered tool for attacking targets
  • 12.
    Forms of CYBER-TERRORISM 1.Privacy Violation: •The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. •Man has become sensitive to publicity.
  • 13.
    2.Secret information appropriationand data theft: •Information technology misuses the data of private individuals •A computer network owned by the Government may contain valuable information concerning defence and other top secrets.
  • 14.
    3.Distributed denial ofService Attack •The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. •This is made possible by first infecting several unprotected computers by way of virus attacks and then taking control of them.
  • 15.
    4.Network Damage andDisruption: •This activity may divert the attention of the security agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier.
  • 16.
    What would theImpact be? The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems or used in support of a physical attack to cause further confusion and possible delays in proper response 1.Direct Cost Implications. 2.Indirect Cost Implications.
  • 17.
  • 18.
    Sample Nuclear Launch While Under Cyber Attack
  • 19.
    Effects •Cyber terrorismcan have a serious large-scale influence on significant number of people. •It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack.
  • 20.
    Cyberspace The NewRealm of Warfare
  • 21.
    Examples •Terrorists inRomania gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved. •The official web site of the Presidential Palace of Afghanistan was affected by a DOS attack that rendered it inaccessible.
  • 22.
    • The internethas provided a virtual war for countries having problems with other such. * As taiwan against China. * Israel against Palestine. *India against pakistan, China
  • 23.
    What does aterrorist group achieve with a cyber attack that they can’t with a conventional attack?
  • 24.
  • 25.
    How can weprotect ourselves? •All accounts should have passwords and the passwords should be unusual, difficult to guess •Change the network configuration when defects become visible •Audit systems and check logs to help in detecting and tracing an intruder •If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it
  • 26.
    CONCLUSION • Aftera close look at some of the facts, I have come to the these conclusions. Some of my conclusions point to the fact that Cyberterrorism could be an actually threat. But the other part is that there is too much media hype created around the possiblity of a Cyberterrorism.