SlideShare a Scribd company logo
NANDHA ENGINEERING
COLLEGE
ERODE-52
CYBER WAR-A NEW
FACE OF TERRORISM
Guided by
E.Kanimozhi ,M.E
AP/Dept of IT
PRESENTED BY
S.INDHUJA
G.KEERTHANA PREETHI
Objective:
Revenge
Politics
Protest
Disrupt the activities of an enemy

country
CYBER WAR
The use of computers to disrupt the
activities of an enemy country, especially the
deliberate attacking of communication
systems.
Cyberterrorism Definition
1.

Political agenda

2.

Use of computers and cyberspace to disrupt
or destroy (may or may not lead to deaths)

3.

Civilians as targets

4.

Publicity

5.

Non-state actors

Traditional Terrorism definition:
•

Use of violence
Cyber Terrorism
Cyber terrorism is the use of Internet
based attacks in terrorist activities,
including acts of deliberate, large-scale
disruption of computer networks, especially
of personal computers attached to the
Internet, by the means of tools such
as computer viruses.

 Cyber terrorism can be also defined as the
intentional use of computer networks, and
public internet to cause destruction and harm
for personal objectives . Objectives may be
political or ideological since this is a form of
terrorism.
Attack Targets
Cell phone worms.
Rootkits.
Trojans.
Spreading virus via trojans.
Distributed denial-of-service attack (DDoS)
A distributed denial-of-service (DDoS) attack
is one in which a multitude of compromised systems
attack a single target, thereby causing denial of
service for users of the targeted system.


 The flood of incoming messages to the target

system essentially forces it to shut down.

Types:
Network centric attack (bandwidth)
Application layer attack(app., calls)
Cyberspace:
 The term cyberspace has become a conventional means to describe

anything associated with the Internet and the diverse Internet culture.

Amongst individuals on cyberspace, there is believed to be a code
of shared rules and ethics mutually beneficial for all to follow, referred to
as cyberethics.

Threats in Cyberspace
1.

Hacktivism

2.

Cybercrime

3.

Cyber terrorism
Levels of Cyber
Terrorism:
Simple Un-Structured
Advanced –Structured
Complex coordinated
The Nature of the Internet:
Strength and Weaknesses
• Redundancy

• Flaws

• Wireless

• Reliance on private

• Vulnerabilities and

flaws can be corrected

sector
Cyber security
Complex security risks and challenges.
Limiting the risk to data before attacks occur is

accomplished through risk assessment
&management.
Solutions:
We provide the following
ProActive&ReActivetechniqs :
Peventive safety measures to tackle cyber attacks,

setting up own team, Computer Forensics, Social
Engineering, identifying vulnerabilities and patching up,
investigating various Cyber Crimes, Penetration and
other crash courses.
Area Of Research
Cyber Terrorism
Advantages:
•Using Cyber Warfare we can obtain critical information on
our enemies.
•New job opportunities in the IT world in this field, especially for
military

Disadvantages:
•We need to be very careful how and were we put data on the web.
•The US is attacked millions of times daily.
•If someone were to break through our cyber security it could have a
huge impact.
•It could take hours to days to fix a breach in security.
Conclusion:
o

Capacity of human mind is unfathomable. It is not possible to
eliminate cyber crime from the cyber space. It is quite possible to check
them. History is the witness that no legislation has succeeded in totally
eliminating crime from the globe.
o

The only possible step is to make people aware of their rights
and duties (to report crime as a collective duty towards the society) and
further making the application of the laws more stringent to check crime.

http://mutex.gmu.edu:2048/login?url=http://
ha
T

ou
kY
n

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
hajra azam
 
Master Homeland Security 2014 Lisi
Master Homeland Security 2014 LisiMaster Homeland Security 2014 Lisi
Master Homeland Security 2014 Lisi
Marco Lisi
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
Neha Raju k
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
kibrutry
 
Cyberware
CyberwareCyberware
Cyberware
Ensar Seker
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
Neha Raju k
 
Brooks18
Brooks18Brooks18
Brooks18
Chuck Brooks
 
Hacking
Hacking Hacking
Hacking
thajmohammed
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
Chiranjit Adhikary
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
ibrahimzubairu2003
 
Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17
Robert Venekamp
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
 
Network security
Network securityNetwork security
Network security
nageshkanna13
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
Neha Raju k
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Boun Yadyok
 
Digital Hippies or Cyber Thugs? Hactivism on the College Campus
Digital Hippies or Cyber Thugs? Hactivism on the College CampusDigital Hippies or Cyber Thugs? Hactivism on the College Campus
Digital Hippies or Cyber Thugs? Hactivism on the College Campus
Beth Ritter-Guth
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the future
b coatesworth
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
EDUJIE DOMINIC IGHODALO
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
GAURAV. H .TANDON
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
Master Homeland Security 2014 Lisi
Master Homeland Security 2014 LisiMaster Homeland Security 2014 Lisi
Master Homeland Security 2014 Lisi
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Brooks18
Brooks18Brooks18
Brooks18
 
Hacking
Hacking Hacking
Hacking
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Application of security computer
Application of security computerApplication of security computer
Application of security computer
 
Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17Venekamp Resume IAP 1-2-17
Venekamp Resume IAP 1-2-17
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Network security
Network securityNetwork security
Network security
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Hippies or Cyber Thugs? Hactivism on the College Campus
Digital Hippies or Cyber Thugs? Hactivism on the College CampusDigital Hippies or Cyber Thugs? Hactivism on the College Campus
Digital Hippies or Cyber Thugs? Hactivism on the College Campus
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the future
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
 

Viewers also liked

Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
Richard Stiennon
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
n|u - The Open Security Community
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
Ina Luft
 
About cyber war
About cyber warAbout cyber war
About cyber war
eugenvaleriu
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
C3 Cyber
C3 CyberC3 Cyber
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Ahmed Al Enizi
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
Dinesh O Bareja
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
Radware
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (20)

Surviving Cyber War
Surviving Cyber WarSurviving Cyber War
Surviving Cyber War
 
Cyber Crime & Cyber War
Cyber Crime & Cyber WarCyber Crime & Cyber War
Cyber Crime & Cyber War
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber War 1st Prize

Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
Subhankar26
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
JayaMalaR6
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Michael Wynn
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
Arivukkarasu Dhanapal
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
anjalika sinha
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
DiegoMtzS
 

Similar to Cyber War 1st Prize (20)

Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 

Cyber War 1st Prize

  • 2. CYBER WAR-A NEW FACE OF TERRORISM Guided by E.Kanimozhi ,M.E AP/Dept of IT PRESENTED BY S.INDHUJA G.KEERTHANA PREETHI
  • 4. CYBER WAR The use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems.
  • 5.
  • 6. Cyberterrorism Definition 1. Political agenda 2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3. Civilians as targets 4. Publicity 5. Non-state actors Traditional Terrorism definition: • Use of violence
  • 7. Cyber Terrorism Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. 
  • 8.  Cyber terrorism can be also defined as the intentional use of computer networks, and public internet to cause destruction and harm for personal objectives . Objectives may be political or ideological since this is a form of terrorism.
  • 9. Attack Targets Cell phone worms. Rootkits. Trojans. Spreading virus via trojans.
  • 10. Distributed denial-of-service attack (DDoS) A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system.   The flood of incoming messages to the target system essentially forces it to shut down. Types: Network centric attack (bandwidth) Application layer attack(app., calls)
  • 11. Cyberspace:  The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. Amongst individuals on cyberspace, there is believed to be a code of shared rules and ethics mutually beneficial for all to follow, referred to as cyberethics. 
  • 13. Levels of Cyber Terrorism: Simple Un-Structured Advanced –Structured Complex coordinated
  • 14. The Nature of the Internet: Strength and Weaknesses • Redundancy • Flaws • Wireless • Reliance on private • Vulnerabilities and flaws can be corrected sector
  • 15. Cyber security Complex security risks and challenges. Limiting the risk to data before attacks occur is accomplished through risk assessment &management.
  • 16. Solutions: We provide the following ProActive&ReActivetechniqs : Peventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and other crash courses.
  • 18. Advantages: •Using Cyber Warfare we can obtain critical information on our enemies. •New job opportunities in the IT world in this field, especially for military Disadvantages: •We need to be very careful how and were we put data on the web. •The US is attacked millions of times daily. •If someone were to break through our cyber security it could have a huge impact. •It could take hours to days to fix a breach in security.
  • 19. Conclusion: o Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. o The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. http://mutex.gmu.edu:2048/login?url=http://