SlideShare a Scribd company logo
1 of 20
CYBER-TERRORISM
 Cyber- Terrorism comprise of two word :-
Cyber :- characteristic of the culture of computers,
information technology, and virtual reality.
Terrorism :- the unofficial or unauthorized use of
violence and intimidation in the pursuit of political aims.
CONTENT
I. Introduction
II. What Is Cyber-Terrorism
III. Feature of Cyber-Terrorism
IV. Example Of Cyber-Terrorism
V. How Does Cyber-Terrorism work??
VI. Common Attack Method
VII. IP Spoofing
VIII. Password Cracking
IX. DOS Attack
X. Black out day
XI. Cyber Terrorism in India
XII. Cyber Terrorism against Traditional Terrorism
XIII. How Does Cyber Terrorism affects you and your future
XIV. What Do we need to do ???
XV. Prevention & Protection
XVI. Conclusion
INTRODUCTION
I. As the use of Internet is
increasing day by day,
traditional concepts and
methods of terrorism have
taken new dimensions.
II. Individuals or groups can use
the anonymity afforded
by cyberspace to threaten
citizens, specific groups (i.e.
with membership based on
ethnicity or belief),
communities and even the
countries.
WHAT IS CYBER-TERRORISM ????
I. The politically motivated use of computers and information technology to cause
severe disruption or widespread fear.
II. It is a phrase used to describe the use of Internet based attacks in terrorist
activities, including acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to the Internet, by the
means of tools such as computer viruses.
FEATURE OF CYBER-TERRORISM
 Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of
most cyber attacks.
 Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple
locations simultaneously.
 Speed of Development: The time between the discovery of a new vulnerability and the
emergence of a new tool or technique that exploits the vulnerability is getting shorter
 Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely
available.
 Automated Methods: The methods of attack have become automated and more sophisticated,
resulting in greater damage from a single attack.
Examples of Cyber terrorism
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terroristic threats made via e-mail.
How does Cyber Terrorism work?
 Hacking : To gain access to (a computer file or network) illegally or without
authorization.
 Misinformation: To provide with incorrect information.
 Virus: A computer program that duplicates itself in a manner that is
harmful to normal computer use. Most viruses work by attaching
themselves to another program. The amount of damage varies; viruses
may erase all data or do nothing but reproduce themselves.
 Worm: A malicious program that replicates itself until it fills all of the
storage space on a drive or network.
3 most common attack methods
I. IP Spoofing
II. Password Cracking
III. Denial-Of-Service attack
IP SPOOFING
 Refers to creation of IP packets with forged
source IP address with the purpose of concealing
the identity of sender.
 Mostly used in Denial-of-Service attacks.
 Most effective in corporate networks where users
can log in without a username or password.
PASSWORD CRACKING
I. Password cracking can be
implemented using brute-force
attacks, Trojan horse programs
and IP spoofing.
II. Password attacks usually refer to
repeated attempts to identify a
user account and/or password;
these repeated attempts are
called brute-force attacks.
III. One example is weak
encryption(LM hash) used by
Microsoft windows XP, can
easily be attacked
DENIAL OF SERVICE ATTACK
I. Denial-of-service attacks
focus on making a service
unavailable to intended
users.
II. 2 forms of DoS attacks:
those that crash services
and those that flood
services.
III. One common attack
method involves saturating
the target machine with
communications requests
such that it cannot respond
to the traffic.
Black Out Day
 It was first cyber war at “New York” city on 14th,August,2003
 Real incidents that horribly suffered New York for 3 days
 The hacker attacks on power lines
 Before 3 days some one some where realize the virus named as “ BLASTER”
 And it a self active
 100 power plants are shut down
 By the incident effects on whole traffic ,air line power ,water system & nuclear reactor too
 New York government struggled 3 months to find the accused
 That was Russian government is totally responsibility to this act
CYBER TERRORISM IN INDIA
 ECIL(Electronic Corporation of India Limited) which was invented electro voting system in
India , controlling parliament security system , Nuclear plants ,Defense etc.
 ECIL CYBER website was hacked by Phrozenmyst
 Not only ECIL and also ISRO ,BARC
 The hacker Phrozenmyst was stolen sensitive data from ECIL and pasted on PAGEBIN website
 Due to they are making some illegal tenders and he tweet on his tweeter account
 From 2010 to Pakistan and china attacking the India by cyber
 Recently Pakistan is made a successfully attack on India by an fake currency at elections time
Cyber terrorism against traditional terrorism
In the future, cyber terrorism may become a feasible option to traditional physical acts
of violence due to:
a. Perceived anonymity.
b. Low risk of detection.
c. Low investment.
d. Operate from nearly any location.
e. Few resources are needed
How does Cyber Terrorism affect you and
your future?
 Air traffic control towers or our airlines infrastructure could be hacked into.
 Banking systems could be violated and all of our money could be stolen.
 Bombs and other explosives could be set off by remote.
 Hospitals could lose all of their information.
 Learn Government secrets and plans
 The tampering of our water systems.
What do we need to do??
 Maintain high alert & vigilance.
 Update OS and applications regularly.
 Enforce strong passwords.
 “Lock down" systems.
 Keep anti-virus software installed and up-to-date.
 Employ intrusion detection systems and firewalls.
Prevention & Protection:
 Be cautious about opening email attachments.
 Complete Software Updates
 Create difficult passwords
 Download anti-virus software
 Uninstall unused applications or services
CONCLUSION:
 Cyber terrorism is a scary concept for many reasons.
 It can do possible serious damages to various aspects of our lives. It is even scarier that
cyber terrorism is so difficult to catch and track and prosecute.
 The information age has brought us many good things, but along with those good things
came some bad things too.
 All we can do as citizens is to protect ourselves by protecting our information, who we
give it to and how much we give it out.
 Our government is trying to do its part, so let’s support them and their efforts and stop
this cyber battle.
Cyber terrorism

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cybercrime
CybercrimeCybercrime
CybercrimeAvinash
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trendsHadeel Sadiq Obaid
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ppt
PptPpt
Ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber security
cyber security cyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
The Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber TerrorismThe Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber TerrorismGavin Hall
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Structures Of Writing
Structures Of WritingStructures Of Writing
Structures Of Writinggsusvs
 
Future of Cyber Terrorism
Future of Cyber TerrorismFuture of Cyber Terrorism
Future of Cyber TerrorismMaurice Dawson
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fiskJulesroa
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 

Viewers also liked (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
The Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber TerrorismThe Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber Terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Structures Of Writing
Structures Of WritingStructures Of Writing
Structures Of Writing
 
Writing a paragraph
Writing a paragraphWriting a paragraph
Writing a paragraph
 
Future of Cyber Terrorism
Future of Cyber TerrorismFuture of Cyber Terrorism
Future of Cyber Terrorism
 
Cyber-Terrorism
Cyber-TerrorismCyber-Terrorism
Cyber-Terrorism
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Clt3328fisk
Clt3328fiskClt3328fisk
Clt3328fisk
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 

Similar to Cyber terrorism

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismawderdlfy
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptxAnkitShaw27
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 

Similar to Cyber terrorism (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Cyber terrorism

  • 1.
  • 2. CYBER-TERRORISM  Cyber- Terrorism comprise of two word :- Cyber :- characteristic of the culture of computers, information technology, and virtual reality. Terrorism :- the unofficial or unauthorized use of violence and intimidation in the pursuit of political aims.
  • 3. CONTENT I. Introduction II. What Is Cyber-Terrorism III. Feature of Cyber-Terrorism IV. Example Of Cyber-Terrorism V. How Does Cyber-Terrorism work?? VI. Common Attack Method VII. IP Spoofing VIII. Password Cracking IX. DOS Attack X. Black out day XI. Cyber Terrorism in India XII. Cyber Terrorism against Traditional Terrorism XIII. How Does Cyber Terrorism affects you and your future XIV. What Do we need to do ??? XV. Prevention & Protection XVI. Conclusion
  • 4. INTRODUCTION I. As the use of Internet is increasing day by day, traditional concepts and methods of terrorism have taken new dimensions. II. Individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and even the countries.
  • 5. WHAT IS CYBER-TERRORISM ???? I. The politically motivated use of computers and information technology to cause severe disruption or widespread fear. II. It is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 6. FEATURE OF CYBER-TERRORISM  Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks.  Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously.  Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorter  Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available.  Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack.
  • 7. Examples of Cyber terrorism  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terroristic threats made via e-mail.
  • 8. How does Cyber Terrorism work?  Hacking : To gain access to (a computer file or network) illegally or without authorization.  Misinformation: To provide with incorrect information.  Virus: A computer program that duplicates itself in a manner that is harmful to normal computer use. Most viruses work by attaching themselves to another program. The amount of damage varies; viruses may erase all data or do nothing but reproduce themselves.  Worm: A malicious program that replicates itself until it fills all of the storage space on a drive or network.
  • 9. 3 most common attack methods I. IP Spoofing II. Password Cracking III. Denial-Of-Service attack
  • 10. IP SPOOFING  Refers to creation of IP packets with forged source IP address with the purpose of concealing the identity of sender.  Mostly used in Denial-of-Service attacks.  Most effective in corporate networks where users can log in without a username or password.
  • 11. PASSWORD CRACKING I. Password cracking can be implemented using brute-force attacks, Trojan horse programs and IP spoofing. II. Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks. III. One example is weak encryption(LM hash) used by Microsoft windows XP, can easily be attacked
  • 12. DENIAL OF SERVICE ATTACK I. Denial-of-service attacks focus on making a service unavailable to intended users. II. 2 forms of DoS attacks: those that crash services and those that flood services. III. One common attack method involves saturating the target machine with communications requests such that it cannot respond to the traffic.
  • 13. Black Out Day  It was first cyber war at “New York” city on 14th,August,2003  Real incidents that horribly suffered New York for 3 days  The hacker attacks on power lines  Before 3 days some one some where realize the virus named as “ BLASTER”  And it a self active  100 power plants are shut down  By the incident effects on whole traffic ,air line power ,water system & nuclear reactor too  New York government struggled 3 months to find the accused  That was Russian government is totally responsibility to this act
  • 14. CYBER TERRORISM IN INDIA  ECIL(Electronic Corporation of India Limited) which was invented electro voting system in India , controlling parliament security system , Nuclear plants ,Defense etc.  ECIL CYBER website was hacked by Phrozenmyst  Not only ECIL and also ISRO ,BARC  The hacker Phrozenmyst was stolen sensitive data from ECIL and pasted on PAGEBIN website  Due to they are making some illegal tenders and he tweet on his tweeter account  From 2010 to Pakistan and china attacking the India by cyber  Recently Pakistan is made a successfully attack on India by an fake currency at elections time
  • 15. Cyber terrorism against traditional terrorism In the future, cyber terrorism may become a feasible option to traditional physical acts of violence due to: a. Perceived anonymity. b. Low risk of detection. c. Low investment. d. Operate from nearly any location. e. Few resources are needed
  • 16. How does Cyber Terrorism affect you and your future?  Air traffic control towers or our airlines infrastructure could be hacked into.  Banking systems could be violated and all of our money could be stolen.  Bombs and other explosives could be set off by remote.  Hospitals could lose all of their information.  Learn Government secrets and plans  The tampering of our water systems.
  • 17. What do we need to do??  Maintain high alert & vigilance.  Update OS and applications regularly.  Enforce strong passwords.  “Lock down" systems.  Keep anti-virus software installed and up-to-date.  Employ intrusion detection systems and firewalls.
  • 18. Prevention & Protection:  Be cautious about opening email attachments.  Complete Software Updates  Create difficult passwords  Download anti-virus software  Uninstall unused applications or services
  • 19. CONCLUSION:  Cyber terrorism is a scary concept for many reasons.  It can do possible serious damages to various aspects of our lives. It is even scarier that cyber terrorism is so difficult to catch and track and prosecute.  The information age has brought us many good things, but along with those good things came some bad things too.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to and how much we give it out.  Our government is trying to do its part, so let’s support them and their efforts and stop this cyber battle.