Information And Communication
Technology
CONTENTS
• Introduction
• Cyber terrorism
• Causes of cyber terrorism
• Features of cyber terrorism
• Common attack
• Examples of cyber terrorist attack
• Cyber terrorism against Traditional terrorism
• Effect of cyber terrorism
• Forms of cyber terrorism
• Affect in future
• Prevention and protection
• Conclusion
INTRODUCTION
The information age is affecting not only the
types of target and weapons terrorist choose,
but also the ways in which groups operate and
structure their organizations. Several of the
most dangerous terrorist organizations are
using information technology such as computer,
software, telecommunication devices and the
internet to better organize and coordinate
dispersed activities.
Cyber Terrorism
“ Cyber terrorism is the premeditated, politically
motivated attack against information , computer
systems, computer programs, and data which
results in violence against non combatant
targets by sub national groups or clandestine
agents.”
Vulnerable Point; Point Of Attack:
• This enemy attacks at a place we are most
vulnerable: the point at which physical and
virtual world converge.
Examples
• Hacking into computer system
• Introducing viruses to vulnerable networks
• Website defacing
• Distributed Denial of service(DDOS) attacks
• Terroristic threats made via e-mail
Features of CYBER TERRORISM
• Difficulty identifying attackers
• Lack of boundaries
• Speed of development
• Low cost of tools
• Automated methods
Common attack
3 most common attack methods are:
• IP Spoofing
• Password cracking
• Distributed Denial-of-service
attacks
Examples of cyber terrorist
attacks
• 9/11 attack
• Canadian government hacking
• Flame
9/11 twin tower attacks
• Al-Qaeda laptop was found in
Afghanistan.
• Hits on websites that contained
“SABOTAGE HANDBOOK”
• Al-Qaeda actively researched publicly
available information concerning critical
infrastructures posted on websites.
Canadian hacking
The Canadian government has revealed that
they become a victim of cyber attacks in
February 2011 from foreign hackers. These
hackers transmitted classified information.
FLAME
A modular computer malware that was
discovered in 2012 as a VIRUS used to
attack computer systems.
CYBER TERRORISM against
TRADITIONAL TERRORISM
In the future, cyber terrorism may become a
feasible option to the traditional physical
acts of violence due to:
• Perceived anonymity
• Low risk of detection
• Low investment
• Operate from any location
• Few resources are needed
Effect of Cyber terrorism
• Harming effects on economy
• Damage to websites
• Effect on national security
• Cyber terrorism ranges from simple
hacking
• Computer viruses to causing of terror
war using computer
Forms of Cyber Terrorism
• Privacy Violation
• Secret information appropriation
• Demolition of e-governance base
• Distributed denial of services attack
• Network damage and disruption
Affects in future:
• Air traffic control towers or our
airlines infrastructure could be
hacked into.
• Banking System could be violated
and all of our money could be stolen.
• Bombs and others explosives could
be set off by remote.
• Hospitals could lose all of their
information.
• Learn government secrets and plans.
Cyber terrorism prevention &
protection tips
• Use strong password
• Secure your computer
• Use antivirus software
• Secure your mobile device
• Install the latest operating
system update
• Protect your data
CONCLUSION
Cyber terrorism is a scary concept for many reasons:
• It can done possible serious damages to the various
aspects of our lives.
• It is even scarier that cyber terrorism is so difficult to
catch, track and prosecute.
• The information age has brought many good things. But
along with those good things came bad things to.
• All we can do as citizens is to protect ourselves by
protecting our information, who we give it to an how
much we get it out.
• Our government is trying to doing its part, so let’s
support them and their efforts and stop this cyber
battle!
Thank You
Any Questions

Cyber terrorism

  • 2.
  • 4.
    CONTENTS • Introduction • Cyberterrorism • Causes of cyber terrorism • Features of cyber terrorism • Common attack • Examples of cyber terrorist attack • Cyber terrorism against Traditional terrorism • Effect of cyber terrorism • Forms of cyber terrorism • Affect in future • Prevention and protection • Conclusion
  • 5.
    INTRODUCTION The information ageis affecting not only the types of target and weapons terrorist choose, but also the ways in which groups operate and structure their organizations. Several of the most dangerous terrorist organizations are using information technology such as computer, software, telecommunication devices and the internet to better organize and coordinate dispersed activities.
  • 6.
  • 7.
    “ Cyber terrorismis the premeditated, politically motivated attack against information , computer systems, computer programs, and data which results in violence against non combatant targets by sub national groups or clandestine agents.”
  • 8.
    Vulnerable Point; PointOf Attack: • This enemy attacks at a place we are most vulnerable: the point at which physical and virtual world converge.
  • 9.
    Examples • Hacking intocomputer system • Introducing viruses to vulnerable networks • Website defacing • Distributed Denial of service(DDOS) attacks • Terroristic threats made via e-mail
  • 11.
    Features of CYBERTERRORISM • Difficulty identifying attackers • Lack of boundaries • Speed of development • Low cost of tools • Automated methods
  • 12.
    Common attack 3 mostcommon attack methods are: • IP Spoofing • Password cracking • Distributed Denial-of-service attacks
  • 13.
    Examples of cyberterrorist attacks • 9/11 attack • Canadian government hacking • Flame
  • 14.
    9/11 twin towerattacks • Al-Qaeda laptop was found in Afghanistan. • Hits on websites that contained “SABOTAGE HANDBOOK” • Al-Qaeda actively researched publicly available information concerning critical infrastructures posted on websites.
  • 15.
    Canadian hacking The Canadiangovernment has revealed that they become a victim of cyber attacks in February 2011 from foreign hackers. These hackers transmitted classified information.
  • 16.
    FLAME A modular computermalware that was discovered in 2012 as a VIRUS used to attack computer systems.
  • 17.
    CYBER TERRORISM against TRADITIONALTERRORISM In the future, cyber terrorism may become a feasible option to the traditional physical acts of violence due to: • Perceived anonymity • Low risk of detection • Low investment • Operate from any location • Few resources are needed
  • 18.
    Effect of Cyberterrorism • Harming effects on economy • Damage to websites • Effect on national security • Cyber terrorism ranges from simple hacking • Computer viruses to causing of terror war using computer
  • 19.
    Forms of CyberTerrorism • Privacy Violation • Secret information appropriation • Demolition of e-governance base • Distributed denial of services attack • Network damage and disruption
  • 20.
    Affects in future: •Air traffic control towers or our airlines infrastructure could be hacked into. • Banking System could be violated and all of our money could be stolen. • Bombs and others explosives could be set off by remote. • Hospitals could lose all of their information. • Learn government secrets and plans.
  • 21.
    Cyber terrorism prevention& protection tips • Use strong password • Secure your computer • Use antivirus software • Secure your mobile device • Install the latest operating system update • Protect your data
  • 22.
    CONCLUSION Cyber terrorism isa scary concept for many reasons: • It can done possible serious damages to the various aspects of our lives. • It is even scarier that cyber terrorism is so difficult to catch, track and prosecute. • The information age has brought many good things. But along with those good things came bad things to. • All we can do as citizens is to protect ourselves by protecting our information, who we give it to an how much we get it out. • Our government is trying to doing its part, so let’s support them and their efforts and stop this cyber battle!
  • 23.
  • 24.