Prepared by:
MS.Raheela Patel.
MS.Analratna Gaikwad.
 What is Cyber Terrorism
 Definition of Cyber war,Cyber Terrorism
 Attacks of Cyber Terrorism
 Effect of Cyber Terrorism on Past ,Present & Future
 Protection & Prevention from Cyber Terrorism
 Conclusion
 The premeditated use of disruptive activities, or the threat thereof, against
computers and/or networks, with the intention to cause harm or further social,
ideological, religious, political or similar objectives. Or to intimidate a person in
furtherance of such objectives.
Cyber Attack
Cyber Terrorism
 Difficulty Identifying Attackers
 Lack of Boundaries
 Speed of Development
 Low Cost of Tools
 Automated Methods
Phishing
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terroristic threats made via e-mail.
 Be cautious about opening email attachments.
 Complete Software Updates
 Create difficult passwords
 Download anti-virus software
 Uninstall unused applications or services
 http://www.impact-alliane.org
 HTTp://www.wikipidea .com
 Http://www.slideshare.net
Thank
You!!!!

Cyber terrorism

  • 1.
  • 3.
     What isCyber Terrorism  Definition of Cyber war,Cyber Terrorism  Attacks of Cyber Terrorism  Effect of Cyber Terrorism on Past ,Present & Future  Protection & Prevention from Cyber Terrorism  Conclusion
  • 4.
     The premeditateduse of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate a person in furtherance of such objectives. Cyber Attack Cyber Terrorism
  • 6.
     Difficulty IdentifyingAttackers  Lack of Boundaries  Speed of Development  Low Cost of Tools  Automated Methods
  • 12.
  • 15.
     Hacking intocomputer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terroristic threats made via e-mail.
  • 17.
     Be cautiousabout opening email attachments.  Complete Software Updates  Create difficult passwords  Download anti-virus software  Uninstall unused applications or services
  • 19.
  • 20.