SlideShare a Scribd company logo
Information And Communication
Technology
CONTENTS
• Introduction
• Cyber terrorism
• Causes of cyber terrorism
• Features of cyber terrorism
• Common attack
• Examples of cyber terrorist attack
• Cyber terrorism against Traditional terrorism
• Effect of cyber terrorism
• Forms of cyber terrorism
• Affect in future
• Prevention and protection
• Conclusion
INTRODUCTION
The information age is affecting not only the
types of target and weapons terrorist choose,
but also the ways in which groups operate and
structure their organizations. Several of the
most dangerous terrorist organizations are
using information technology such as computer,
software, telecommunication devices and the
internet to better organize and coordinate
dispersed activities.
Cyber Terrorism
“ Cyber terrorism is the premeditated, politically
motivated attack against information , computer
systems, computer programs, and data which
results in violence against non combatant
targets by sub national groups or clandestine
agents.”
Vulnerable Point; Point Of Attack:
• This enemy attacks at a place we are most
vulnerable: the point at which physical and
virtual world converge.
Examples
• Hacking into computer system
• Introducing viruses to vulnerable networks
• Website defacing
• Distributed Denial of service(DDOS) attacks
• Terroristic threats made via e-mail
Features of CYBER TERRORISM
• Difficulty identifying attackers
• Lack of boundaries
• Speed of development
• Low cost of tools
• Automated methods
Common attack
3 most common attack methods are:
• IP Spoofing
• Password cracking
• Distributed Denial-of-service
attacks
Examples of cyber terrorist
attacks
• 9/11 attack
• Canadian government hacking
• Flame
9/11 twin tower attacks
• Al-Qaeda laptop was found in
Afghanistan.
• Hits on websites that contained
“SABOTAGE HANDBOOK”
• Al-Qaeda actively researched publicly
available information concerning critical
infrastructures posted on websites.
Canadian hacking
The Canadian government has revealed that
they become a victim of cyber attacks in
February 2011 from foreign hackers. These
hackers transmitted classified information.
FLAME
A modular computer malware that was
discovered in 2012 as a VIRUS used to
attack computer systems.
CYBER TERRORISM against
TRADITIONAL TERRORISM
In the future, cyber terrorism may become a
feasible option to the traditional physical
acts of violence due to:
• Perceived anonymity
• Low risk of detection
• Low investment
• Operate from any location
• Few resources are needed
Effect of Cyber terrorism
• Harming effects on economy
• Damage to websites
• Effect on national security
• Cyber terrorism ranges from simple
hacking
• Computer viruses to causing of terror
war using computer
Forms of Cyber Terrorism
• Privacy Violation
• Secret information appropriation
• Demolition of e-governance base
• Distributed denial of services attack
• Network damage and disruption
Affects in future:
• Air traffic control towers or our
airlines infrastructure could be
hacked into.
• Banking System could be violated
and all of our money could be stolen.
• Bombs and others explosives could
be set off by remote.
• Hospitals could lose all of their
information.
• Learn government secrets and plans.
Cyber terrorism prevention &
protection tips
• Use strong password
• Secure your computer
• Use antivirus software
• Secure your mobile device
• Install the latest operating
system update
• Protect your data
CONCLUSION
Cyber terrorism is a scary concept for many reasons:
• It can done possible serious damages to the various
aspects of our lives.
• It is even scarier that cyber terrorism is so difficult to
catch, track and prosecute.
• The information age has brought many good things. But
along with those good things came bad things to.
• All we can do as citizens is to protect ourselves by
protecting our information, who we give it to an how
much we get it out.
• Our government is trying to doing its part, so let’s
support them and their efforts and stop this cyber
battle!
Thank You
Any Questions

More Related Content

What's hot

Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
LearningwithRayYT
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
yatendrakumar47
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 

What's hot (20)

Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Cyber security
Cyber securityCyber security
Cyber security
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Similar to Cyber terrorism

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cyber crime
Cyber crimeCyber crime
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Tech Mahindra Ltd.
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Cyber crime
Cyber crimeCyber crime
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
Subhankar26
 
Ict presentation pptx
Ict presentation pptxIct presentation pptx
Ict presentation pptx
GulsherZ
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
Weyai1
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
sakshiyad2611
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.pptArshad Khan
 
E secuity
E secuityE secuity
E secuity
arpit sadana
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
kirupasuchi1996
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 

Similar to Cyber terrorism (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Ict presentation pptx
Ict presentation pptxIct presentation pptx
Ict presentation pptx
 
weyai cybersecurity.pptx
weyai cybersecurity.pptxweyai cybersecurity.pptx
weyai cybersecurity.pptx
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
E secuity
E secuityE secuity
E secuity
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Cyber terrorism

  • 1.
  • 3.
  • 4. CONTENTS • Introduction • Cyber terrorism • Causes of cyber terrorism • Features of cyber terrorism • Common attack • Examples of cyber terrorist attack • Cyber terrorism against Traditional terrorism • Effect of cyber terrorism • Forms of cyber terrorism • Affect in future • Prevention and protection • Conclusion
  • 5. INTRODUCTION The information age is affecting not only the types of target and weapons terrorist choose, but also the ways in which groups operate and structure their organizations. Several of the most dangerous terrorist organizations are using information technology such as computer, software, telecommunication devices and the internet to better organize and coordinate dispersed activities.
  • 7. “ Cyber terrorism is the premeditated, politically motivated attack against information , computer systems, computer programs, and data which results in violence against non combatant targets by sub national groups or clandestine agents.”
  • 8. Vulnerable Point; Point Of Attack: • This enemy attacks at a place we are most vulnerable: the point at which physical and virtual world converge.
  • 9. Examples • Hacking into computer system • Introducing viruses to vulnerable networks • Website defacing • Distributed Denial of service(DDOS) attacks • Terroristic threats made via e-mail
  • 10.
  • 11. Features of CYBER TERRORISM • Difficulty identifying attackers • Lack of boundaries • Speed of development • Low cost of tools • Automated methods
  • 12. Common attack 3 most common attack methods are: • IP Spoofing • Password cracking • Distributed Denial-of-service attacks
  • 13. Examples of cyber terrorist attacks • 9/11 attack • Canadian government hacking • Flame
  • 14. 9/11 twin tower attacks • Al-Qaeda laptop was found in Afghanistan. • Hits on websites that contained “SABOTAGE HANDBOOK” • Al-Qaeda actively researched publicly available information concerning critical infrastructures posted on websites.
  • 15. Canadian hacking The Canadian government has revealed that they become a victim of cyber attacks in February 2011 from foreign hackers. These hackers transmitted classified information.
  • 16. FLAME A modular computer malware that was discovered in 2012 as a VIRUS used to attack computer systems.
  • 17. CYBER TERRORISM against TRADITIONAL TERRORISM In the future, cyber terrorism may become a feasible option to the traditional physical acts of violence due to: • Perceived anonymity • Low risk of detection • Low investment • Operate from any location • Few resources are needed
  • 18. Effect of Cyber terrorism • Harming effects on economy • Damage to websites • Effect on national security • Cyber terrorism ranges from simple hacking • Computer viruses to causing of terror war using computer
  • 19. Forms of Cyber Terrorism • Privacy Violation • Secret information appropriation • Demolition of e-governance base • Distributed denial of services attack • Network damage and disruption
  • 20. Affects in future: • Air traffic control towers or our airlines infrastructure could be hacked into. • Banking System could be violated and all of our money could be stolen. • Bombs and others explosives could be set off by remote. • Hospitals could lose all of their information. • Learn government secrets and plans.
  • 21. Cyber terrorism prevention & protection tips • Use strong password • Secure your computer • Use antivirus software • Secure your mobile device • Install the latest operating system update • Protect your data
  • 22. CONCLUSION Cyber terrorism is a scary concept for many reasons: • It can done possible serious damages to the various aspects of our lives. • It is even scarier that cyber terrorism is so difficult to catch, track and prosecute. • The information age has brought many good things. But along with those good things came bad things to. • All we can do as citizens is to protect ourselves by protecting our information, who we give it to an how much we get it out. • Our government is trying to doing its part, so let’s support them and their efforts and stop this cyber battle!