1. Cyber Terrorism And
Information Warefare.
Seminar Presentation
By Rohit Raj Sharma
Enrollment : 214510316031
Department : IT-A
Cyber Terrorism and Information Warfare
2. . Cyber Terrorism and Information Warfare 2
Objectives
■ Explain Cyber Terrorism
■ Understand Information Warfare
■ Understand plausible cyber terrorism
scenarios
■ Appreciate the dangers posed by cyber
terrorism
2
3. 3
Introduction
■ Cyber Terrorism
Cyberterrorism is the convergence of cyberspace and
terrorism. It refers to unlawful attacks and threats of attacks
against computers, networks and the information stored
therein when done to intimidate or coerce a government or
its people in furtherance of political or social objectives.
❑ Simply, the use of computers to launch a
terrorist attack.
❑ Like other forms of terrorism, only the way or
method of the attack has changed.
3
4. Cyber Terrorism and Information Warfare 4
Introduction (cont.)
■ Cyber Terrorism
■ Significant economic damage
■ Disruptions to communications
■ Disruptions in supply lines
■ General degradation of the national
infrastructure
■ All possible via the Internet
4
5. 5
Introduction (cont.)
■ Cyber Terrorism
➢ MyDoom virus may have been an example.
➢ MyDoom is a very effective worm made to create zombies
out of hundreds of thousands of computers. Hackers could
then use each hijacked terminal to wage a denial of service
(DoS) attack toward a company they identified. In 2004, no
one knew who developed the code.
➢ Our nation can expect to be the target of
serious cyber terrorism.
5
6. 6
Economic Attacks
■ Cyber attacks cause economic damage:
❑ Lost files and records.
❑ Destroyed data.
❑ Stolen credit cards.
❑ Money stolen from accounts.
❑ Time the IT staff spends cleaning up.
6
7. 7
Economic Attacks (cont.)
■ Any organization wanting to do harm could
set up a group with.
❑ Computer security experts.
❑ Programming experts.
❑ Networking experts.
7
9. 9
Economic Attacks (cont.)
■ Team 2 creates a Trojan
❑ Showing business tips or slogans, popular
download with business people
❑ Deletes key system files on a certain date
9
10. 10
Economic Attacks (cont.)
■ Team 3 creates a virus.
❑ A DDoS on key financial Websites, all to take
place on the same predetermined date.
■ Teams 4 and 5 footprint major bank systems.
■ Team 6 prepares to flood the Internet with
false stock tips.
10
11. 11
Military Operations Attacks
■ Attempts to hack into the ultra-secure DoD,
CIA, or NSA systems would be met with
immediate arrest.
■ A successful attack on less secure systems
could also put our country at risk.
❑ Lower-level security systems that protect the
logistics programs
11
12. 12
Military Operations Attacks (cont.)
■ One hack finds that C-141s are routed to a
certain base.
■ Another hack reveals food for 5,000 is
delivered to that base.
■ The final hack shows two brigades have had
leaves canceled.
■ Social engineering puts information together
to reveal size and time of a deployment.
12
13. 13
Military Operations Attacks (cont.)
■ Variations on a theme
❑ Hacker changes the date and destination of
the food and weapons delivery.
❑ Brigades are now at risk.
■ Without food and ammunition
13
14. 14
Military Operations Attacks (cont.)
■ Illustrates the need for high security on all
military systems.
■ There are clearly no “low-priority” security
systems.
14
15. 15
General Attacks
■ Unfocused attacks with no specific target
❑ Sheer volume of these attacks causes
significant economic damage.
❑ IT personnel drop normal projects to combat
general attacks.
❑ E-commerce is virtually unusable.
15
16. 16
Information Warfare
■ Any attempt to manipulate information in
pursuit of a military or political goal:
❑ Use computers to gather information.
❑ Use computers to disseminate propaganda.
16
17. 17
Information Warfare (cont.)
■ Propaganda:
❑ Any group could use what appears to be an
Internet news Website.
❑ Many people believe and repeat what they see
on the Internet.
17
22. 22
Actual Cases (cont.)
■ In Tehran [Iran], the armed forces and
technical universities joined to create
independent cyber R&D centers and train
personnel in IT skills.
■ Tehran seeks to buy IT technical assistance
and training from Russia and India.
22
23. 23
Actual Cases (cont.)
■ Russia’s armed forces have developed a
robust cyber warfare doctrine.
■ Moscow also has a track record of offensive
hacking into Chechen Websites.
■ Available evidence is inadequate to predict
whether Russia’s intelligence services or
armed forces would attack U.S. networks.
23
24. 24
Defense Against Cyber Terrorism
■ Recommendations for preparing for and
protecting against cyber terrorism include
❑ A Manhattan Project-level program
❑ Research and academic programs dedicated
to security
❑ Computer crime treated more seriously
24
25. 25
Defense Against Cyber Terrorism
(cont.)
❑ Every police department must have access
to computer crime specialists.
❑ Security professionals must have a forum
to report and discuss emergencies.
25