SlideShare a Scribd company logo
Cyber Terrorism
Prepared by : Awder Muahamad
University of halabja
Computer scince
“Cyber terrorism”
“ Tomorrow’s terrorist may be able to do more
damage with a keyboard than with a bomb
Content:
 Introduction
Cyber terrorism
Common attack
Examples
Affect In Future
Prevention & Protection
Conclusion
INTRODUCTION
 As the use of Internet is increasing day by day, traditional
concepts and methods of terrorism have taken new
dimensions.
 Individuals or groups can use the anonymity afforded by
cyberspace to threaten citizens, specific groups (i.e. with
membership based on ethnicity or belief), communities and
even the countries.
What is Cyber terrorism??
 Cyber terrorism is a phrase used to describe the use of
Internet based attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer networks,
especially of personal computers attached to the Internet, by
the means of tools such as computer viruses.
“ Featurers of Cyber terrorism
 Difficulty Identifying Attackers: It remains difficult to determine the identity
of the initiators of most cyber attacks.
 Lack of Boundaries: Attacks can originate from anywhere in the world and
from multiple locations simultaneously.
 Speed of Development: The time between the discovery of a new
vulnerability and the emergence of a new tool or technique that exploits
the vulnerability is getting shorter
 Low Cost of Tools: The technology employed in attacks is simple to use,
inexpensive, and widely available.
 Automated Methods: The methods of attack have become automated and
more sophisticated, resulting in greater damage from a single attack.
Examples of Cyber terrorism
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terroristic threats made via e-mail.
How does Cyber Terrorism work?
Hacking : To gain access to (a computer file or network) illegally or without
authorization.
Misinformation: To provide with incorrect information.
Virus: A computer program that duplicates itself in a manner that is harmful
to normal computer use. Most viruses work by attaching themselves to
another program. The amount of damage varies; viruses may erase all data or
do nothing but reproduce themselves.
Worm: A malicious program that replicates itself until it fills all of the storage
space on a drive or network
3 most common attack methods
₰ IP spoofing.
₰ Password Cracking.
₰ Denial-of-service attacks.
IP Spoofing:
 Refers to creation of IP packets with forged source IP address with the
purpose of concealing the identity of sender.
 Mostly used in Denial-of-Service attacks.
Password Cracking:
 Password cracking can be implemented using brute-force attacks, Trojan
horse programs and IP spoofing.
 Password attacks usually refer to repeated attempts to identify a user
account and/or password; these repeated attempts are called brute-force
attacks.
Denial-of-Service attacks:
 Denial-of-service attacks focus on making a service unavailable to
intended users.
 2 forms of DoS attacks: those that crash services and those that flood
services.
 One common attack method involves saturating the target machine with
communications requests such that it cannot respond to the traffic
Examples of Cyber terrorist attacks:
 9/11 attack.
 Ahmedabad bomb blast.
 26/11 Mumbai attack.
How does Cyber Terrorism affect you and your future?
 Air traffic control towers or our airlines infrastructure could be
hacked into.
 Banking systems could be violated and all of our money could
be stolen.
 Bombs and other explosives could be set off by remote.
Hospitals could lose all of their information.
 Learn Government secrets and plans
Prevention & Protection:
 Be cautious about opening email attachments.
 Complete Software Updates
 Create difficult passwords
 Download anti-virus software Uninstall unused applications or services
Conclusion
 Cyber terrorism is a scary concept for many reasons.
 It can do possible serious damages to various aspects of our lives. It is
even scarier that cyber terrorism is so difficult to catch and track and
prosecute.
 All we can do as citizens is to protect ourselves by protecting our
information, who we give it to and how much we give it out.
“ thanks to waching”

More Related Content

What's hot

Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
100688767-barrett
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
Aditya Singh
 
Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
Umair Javed
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Raheela Patel
 
Attack types
Attack typesAttack types
Attack types
S.M. Towhidul Islam
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Jacqueline Fick
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorism
kelvingg
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Online safety
Online safety Online safety
Online safety
MARCPELAYO1
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
techexpert2345
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Arnav Chowdhury
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aashir Khalil
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
S.M. Towhidul Islam
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 

What's hot (19)

Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyber Crimes
Cyber Crimes Cyber Crimes
Cyber Crimes
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Attack types
Attack typesAttack types
Attack types
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorism
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Online safety
Online safety Online safety
Online safety
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Similar to Cyber terrorism

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
AnkitShaw27
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
sakshiyad2611
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
Stephanie Williams
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
Daniel Martin
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Muddasarahmed5
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
Abhishek Viswam
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 

Similar to Cyber terrorism (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
What Is Denial Of Service Attack
What Is Denial Of Service AttackWhat Is Denial Of Service Attack
What Is Denial Of Service Attack
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 

More from c_s_halabja

Vpn
VpnVpn
5G
5G5G
Optical computer
Optical computer Optical computer
Optical computer
c_s_halabja
 
Li-Fi vs. Wi-Fi
Li-Fi vs. Wi-FiLi-Fi vs. Wi-Fi
Li-Fi vs. Wi-Fi
c_s_halabja
 
IT in automobile
IT in automobile IT in automobile
IT in automobile
c_s_halabja
 
Unicode and kurdish fonts
Unicode and kurdish fontsUnicode and kurdish fonts
Unicode and kurdish fonts
c_s_halabja
 

More from c_s_halabja (7)

Vpn
VpnVpn
Vpn
 
5G
5G5G
5G
 
Optical computer
Optical computer Optical computer
Optical computer
 
Li-Fi vs. Wi-Fi
Li-Fi vs. Wi-FiLi-Fi vs. Wi-Fi
Li-Fi vs. Wi-Fi
 
IT in automobile
IT in automobile IT in automobile
IT in automobile
 
Unicode and kurdish fonts
Unicode and kurdish fontsUnicode and kurdish fonts
Unicode and kurdish fonts
 
Fiber optic
Fiber opticFiber optic
Fiber optic
 

Recently uploaded

Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
SAMIR PANDA
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
Areesha Ahmad
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
muralinath2
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Erdal Coalmaker
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
sachin783648
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
muralinath2
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
moosaasad1975
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
muralinath2
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
silvermistyshot
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
AlguinaldoKong
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
aishnasrivastava
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SELF-EXPLANATORY
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
AADYARAJPANDEY1
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
sonaliswain16
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
yusufzako14
 

Recently uploaded (20)

Seminar of U.V. Spectroscopy by SAMIR PANDA
 Seminar of U.V. Spectroscopy by SAMIR PANDA Seminar of U.V. Spectroscopy by SAMIR PANDA
Seminar of U.V. Spectroscopy by SAMIR PANDA
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
erythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptxerythropoiesis-I_mechanism& clinical significance.pptx
erythropoiesis-I_mechanism& clinical significance.pptx
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
Unveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdfUnveiling the Energy Potential of Marshmallow Deposits.pdf
Unveiling the Energy Potential of Marshmallow Deposits.pdf
 
Comparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebratesComparative structure of adrenal gland in vertebrates
Comparative structure of adrenal gland in vertebrates
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
 
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptxBody fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
Body fluids_tonicity_dehydration_hypovolemia_hypervolemia.pptx
 
Lateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensiveLateral Ventricles.pdf very easy good diagrams comprehensive
Lateral Ventricles.pdf very easy good diagrams comprehensive
 
EY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptxEY - Supply Chain Services 2018_template.pptx
EY - Supply Chain Services 2018_template.pptx
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCINGRNA INTERFERENCE: UNRAVELING GENETIC SILENCING
RNA INTERFERENCE: UNRAVELING GENETIC SILENCING
 
role of pramana in research.pptx in science
role of pramana in research.pptx in sciencerole of pramana in research.pptx in science
role of pramana in research.pptx in science
 
in vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptxin vitro propagation of plants lecture note.pptx
in vitro propagation of plants lecture note.pptx
 

Cyber terrorism

  • 1. Cyber Terrorism Prepared by : Awder Muahamad University of halabja Computer scince
  • 2. “Cyber terrorism” “ Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb
  • 3. Content:  Introduction Cyber terrorism Common attack Examples Affect In Future Prevention & Protection Conclusion
  • 4. INTRODUCTION  As the use of Internet is increasing day by day, traditional concepts and methods of terrorism have taken new dimensions.  Individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and even the countries.
  • 5. What is Cyber terrorism??  Cyber terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 6. “ Featurers of Cyber terrorism  Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks.  Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously.  Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorter  Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available.  Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack.
  • 7. Examples of Cyber terrorism  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terroristic threats made via e-mail.
  • 8. How does Cyber Terrorism work? Hacking : To gain access to (a computer file or network) illegally or without authorization. Misinformation: To provide with incorrect information. Virus: A computer program that duplicates itself in a manner that is harmful to normal computer use. Most viruses work by attaching themselves to another program. The amount of damage varies; viruses may erase all data or do nothing but reproduce themselves. Worm: A malicious program that replicates itself until it fills all of the storage space on a drive or network
  • 9. 3 most common attack methods ₰ IP spoofing. ₰ Password Cracking. ₰ Denial-of-service attacks.
  • 10. IP Spoofing:  Refers to creation of IP packets with forged source IP address with the purpose of concealing the identity of sender.  Mostly used in Denial-of-Service attacks.
  • 11. Password Cracking:  Password cracking can be implemented using brute-force attacks, Trojan horse programs and IP spoofing.  Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks.
  • 12. Denial-of-Service attacks:  Denial-of-service attacks focus on making a service unavailable to intended users.  2 forms of DoS attacks: those that crash services and those that flood services.  One common attack method involves saturating the target machine with communications requests such that it cannot respond to the traffic
  • 13.
  • 14. Examples of Cyber terrorist attacks:  9/11 attack.  Ahmedabad bomb blast.  26/11 Mumbai attack.
  • 15. How does Cyber Terrorism affect you and your future?  Air traffic control towers or our airlines infrastructure could be hacked into.  Banking systems could be violated and all of our money could be stolen.  Bombs and other explosives could be set off by remote. Hospitals could lose all of their information.  Learn Government secrets and plans
  • 16. Prevention & Protection:  Be cautious about opening email attachments.  Complete Software Updates  Create difficult passwords  Download anti-virus software Uninstall unused applications or services
  • 17. Conclusion  Cyber terrorism is a scary concept for many reasons.  It can do possible serious damages to various aspects of our lives. It is even scarier that cyber terrorism is so difficult to catch and track and prosecute.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to and how much we give it out.
  • 18. “ thanks to waching”