SlideShare a Scribd company logo
1 of 35
1
2
• The use of computing resources to intimidate,
coerce or harm people, places or systems we
depend upon.
• Amalgamation of Cyberspace and Terrorism.
• Leveraging of a target's computers and
information technology, particularly via the
Internet, to cause physical, real-world harm or
severe disruption with the aim of advancing the
attacker's own political or religious goals.
3
4
Why would a terrorist decide to use the
Internet, rather than using the usual methods
of assassination, hostage taking and guerrilla
warfare?
5
• Chances of capture, injury, or death to a
cyber terrorist are less
• Cyber terrorism is difficult to track
• Easy to accomplish due to lack of
understanding of security risks
But, in one of its more unusual forms,
cyber-terrorism can be related with
physical, real world terrorism.
6
7
• Crackers -A cracker is someone who breaks
into someone else's computer system, often on
a network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
• White Hat Hackers – Hackers who break into
computers. They have no right to access but
they often report the security leaks to the
victims.
• Script bunnies - People who would like to be
hackers but don’t have much technical
expertise. They download click-and-point
software that automatically does the hacking for
them. 8
9
10
• Dependence on Network Infrastructure
and the Internet
• Lack of Understanding of Security Risks
• Lack of Funding for Adequate Network
Security Tools
• Difficulty in tracking the Cyber terrorist
11
12
• Information Gathering Purposes
• Prank
• National pride
• Financial gains
• Hatred
13
14
• Information theft
Minor attacks come in the form of "data diddling", where
information in the computer is changed. This may involve changing
medical or financial records or stealing of passwords. Hackers may
even prevent users who should have access from gaining access to
the machine.
Ethical issues in this case include things like invasion of privacy and
ownership conflicts.
• Credit Card Number Theft
People are using credit cards for more and more of their
purchases as time goes on.. Credit cards are especially easy to use
fraudulently, because they require no extra identification number to
use.
All that a thief needs is pure information-they don't need the card,
but just the number on the card. Recently, with people spending
more on purchases transacted over the internet, credit card fraud is
becoming easier.
More than 40 million credit card numbers belonging to U.S.
consumers were accessed by a computer hacker in the year 2005
according to MasterCard International Inc.
15
• Electronic Cash
We are already well on the way to a cash-free society. People now
use ATM cards, credit cards, and check-cards for a large
percentage of their purchasing. As we move further from a paper-
money society, to a purely electronic economy, new types of crime
will emerge as accessing these is quite easier.
All we can be sure of, is that criminals of tomorrow, like those of last
century and those of today, will keep on innovating.
This is because, as a system advances, so does the criminals.
• Hacking
Hacking is basically knowing programmable systems and how they
work.
How can hacking be helpful ?
Some agencies hire hackers to show them the downfalls in their
security system so they can improve it against hackers that want
information or access into the computer for other reasons.
Hacking is a form of art for some people .
But generally , it is being used adversely.
One of the popular terror act is to threaten a large bank. 16
17
• In 2001 ,12 billion dollars in losses due to security breaches, virus
attacks and hacked network
• The NIMDA virus alone accounted for 2 billion dollars in losses
• The Mydoom virus sent 100 million infected e-mails in the first 36
hours, and accounted for roughly a quarter of global e-mail traffic on
Jan. 26, 2004.
• The pessimists claim that cyber attacks cost $10-$15 billion per year
and would cost tens of billions more to fix, the optimists claim that all
cyber crime over a five year period cumulatively cost only $1 billion
and fixing the current vulnerabilities would only cost $4-$5 billion
more.
As the Cyberspace continues to expand, and systems
continue to be assigned more responsibility while
becoming more and more complex and interdependent,
sabotage or terrorism via cyberspace may become a
more serious threat.
18
19
• Cooperate and share intelligence among
all agencies.
• The tools of a counter-Cyber Terrorist
team must be real-time and dynamic, as
the weapons will continually change.
• Make building, network and desktop
security a priority.
• Report instances of cyber crime to local
law enforcement agencies.
20
21
Building/Office Security
• Use of secure entrances – card keys, biometric
entry devices
• Personnel should question why non-staff are in
the building
• Security personnel
• Standard operating procedures in cases of
dismissal or reprimand
• Background checks on contracted service
personnel looking for a past history of theft, drug
use or sale, assault, computer crime
22
Desktop/Laptop Computer
Security
• Virus detection software that is regularly updated
• Secure physical set-up that is not open to the
public or unmonitored
• Passworded screen savers
• Require network logins if you are on a network
• Standardize the desktop so as to limit what an
end-user can and cannot do
23
Server Security
• The server should be kept in a locked and
restricted area
• Administrative passwords and equivalencies
should be given to a minimal number of people
• Administrative passwords should be changed
regularly
• Users should only be given access to file
systems that they will actually need to use
• Virus detection software that is regularly updated
24
Network Security
• Require logins and passwords
• Users should be required to change passwords
at least every 30 days
• The passwords should be easy enough to
remember and difficult enough to guess
• Use of Firewalls and Routers
• Standard Operating procedures when an
employee leaves, is terminated or is given
formal reprimands
25
• Disable unused accounts
• Require users to log-out and login each day
• Encrypt all traffic over the LAN
26
27
• Cyber forensics is a newly emerged and
developing field, which can be described as the
study of digital evidence resulting from an
incident.
• It involves collection and analysis of digital data
within an investigative process. Cyber forensics
involves the investigation and analysis of a
computer to determine the potential of legal
evidence
28
29
• To prevent cyber stalking avoid disclosing any
information pertaining to oneself. This is as good
as disclosing your identity to strangers in public
place.
• Always avoid sending any photograph online
particularly to strangers and chat friends as
there have been incidents of misuse of the
photographs.
• Never send your credit card number to any site
that is not secured, to guard against frauds.
• Always keep a watch on the sites that your
children are accessing to prevent any kind of
harassment or depravation in children.
• Use of firewalls may be beneficial.
30
31
• Provide for Contingencies if Critical
Systems and Networks are Unavailable or
Damaged
– Determine alternate ways of processing data
– Determine dependencies between systems
and equipment
– Determine backup personnel
• The plan should be current and known
32
33
• BEST BOOKS:-
• >Hacking exposed by Stuart McClure
• >Unofficial guide to ethical hacking by Ankit Fadia
• >Google Hacks by Calishain & Cornets
• BEST WEBSITES:-
• >www.google.com
• >www.securityfocus.com
• >www.darkangel.pro.tcq
• http://www.cybercrimelaw.org/index.cfm - Cybercrime
Law
• http://www.rbs2.com/ccrime.htm#anchor666666 -
Computer Crimes, Ronald B. Standler
34
35

More Related Content

What's hot

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web DevelopersKrishna Srikanth Manda
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 

What's hot (20)

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Hacking
Hacking Hacking
Hacking
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 

Similar to Cyberterrorism

Similar to Cyberterrorism (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 

Recently uploaded

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Recently uploaded (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Cyberterrorism

  • 1. 1
  • 2. 2
  • 3. • The use of computing resources to intimidate, coerce or harm people, places or systems we depend upon. • Amalgamation of Cyberspace and Terrorism. • Leveraging of a target's computers and information technology, particularly via the Internet, to cause physical, real-world harm or severe disruption with the aim of advancing the attacker's own political or religious goals. 3
  • 4. 4
  • 5. Why would a terrorist decide to use the Internet, rather than using the usual methods of assassination, hostage taking and guerrilla warfare? 5
  • 6. • Chances of capture, injury, or death to a cyber terrorist are less • Cyber terrorism is difficult to track • Easy to accomplish due to lack of understanding of security risks But, in one of its more unusual forms, cyber-terrorism can be related with physical, real world terrorism. 6
  • 7. 7
  • 8. • Crackers -A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. • White Hat Hackers – Hackers who break into computers. They have no right to access but they often report the security leaks to the victims. • Script bunnies - People who would like to be hackers but don’t have much technical expertise. They download click-and-point software that automatically does the hacking for them. 8
  • 9. 9
  • 10. 10
  • 11. • Dependence on Network Infrastructure and the Internet • Lack of Understanding of Security Risks • Lack of Funding for Adequate Network Security Tools • Difficulty in tracking the Cyber terrorist 11
  • 12. 12
  • 13. • Information Gathering Purposes • Prank • National pride • Financial gains • Hatred 13
  • 14. 14
  • 15. • Information theft Minor attacks come in the form of "data diddling", where information in the computer is changed. This may involve changing medical or financial records or stealing of passwords. Hackers may even prevent users who should have access from gaining access to the machine. Ethical issues in this case include things like invasion of privacy and ownership conflicts. • Credit Card Number Theft People are using credit cards for more and more of their purchases as time goes on.. Credit cards are especially easy to use fraudulently, because they require no extra identification number to use. All that a thief needs is pure information-they don't need the card, but just the number on the card. Recently, with people spending more on purchases transacted over the internet, credit card fraud is becoming easier. More than 40 million credit card numbers belonging to U.S. consumers were accessed by a computer hacker in the year 2005 according to MasterCard International Inc. 15
  • 16. • Electronic Cash We are already well on the way to a cash-free society. People now use ATM cards, credit cards, and check-cards for a large percentage of their purchasing. As we move further from a paper- money society, to a purely electronic economy, new types of crime will emerge as accessing these is quite easier. All we can be sure of, is that criminals of tomorrow, like those of last century and those of today, will keep on innovating. This is because, as a system advances, so does the criminals. • Hacking Hacking is basically knowing programmable systems and how they work. How can hacking be helpful ? Some agencies hire hackers to show them the downfalls in their security system so they can improve it against hackers that want information or access into the computer for other reasons. Hacking is a form of art for some people . But generally , it is being used adversely. One of the popular terror act is to threaten a large bank. 16
  • 17. 17
  • 18. • In 2001 ,12 billion dollars in losses due to security breaches, virus attacks and hacked network • The NIMDA virus alone accounted for 2 billion dollars in losses • The Mydoom virus sent 100 million infected e-mails in the first 36 hours, and accounted for roughly a quarter of global e-mail traffic on Jan. 26, 2004. • The pessimists claim that cyber attacks cost $10-$15 billion per year and would cost tens of billions more to fix, the optimists claim that all cyber crime over a five year period cumulatively cost only $1 billion and fixing the current vulnerabilities would only cost $4-$5 billion more. As the Cyberspace continues to expand, and systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat. 18
  • 19. 19
  • 20. • Cooperate and share intelligence among all agencies. • The tools of a counter-Cyber Terrorist team must be real-time and dynamic, as the weapons will continually change. • Make building, network and desktop security a priority. • Report instances of cyber crime to local law enforcement agencies. 20
  • 21. 21
  • 22. Building/Office Security • Use of secure entrances – card keys, biometric entry devices • Personnel should question why non-staff are in the building • Security personnel • Standard operating procedures in cases of dismissal or reprimand • Background checks on contracted service personnel looking for a past history of theft, drug use or sale, assault, computer crime 22
  • 23. Desktop/Laptop Computer Security • Virus detection software that is regularly updated • Secure physical set-up that is not open to the public or unmonitored • Passworded screen savers • Require network logins if you are on a network • Standardize the desktop so as to limit what an end-user can and cannot do 23
  • 24. Server Security • The server should be kept in a locked and restricted area • Administrative passwords and equivalencies should be given to a minimal number of people • Administrative passwords should be changed regularly • Users should only be given access to file systems that they will actually need to use • Virus detection software that is regularly updated 24
  • 25. Network Security • Require logins and passwords • Users should be required to change passwords at least every 30 days • The passwords should be easy enough to remember and difficult enough to guess • Use of Firewalls and Routers • Standard Operating procedures when an employee leaves, is terminated or is given formal reprimands 25
  • 26. • Disable unused accounts • Require users to log-out and login each day • Encrypt all traffic over the LAN 26
  • 27. 27
  • 28. • Cyber forensics is a newly emerged and developing field, which can be described as the study of digital evidence resulting from an incident. • It involves collection and analysis of digital data within an investigative process. Cyber forensics involves the investigation and analysis of a computer to determine the potential of legal evidence 28
  • 29. 29
  • 30. • To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place. • Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs. • Never send your credit card number to any site that is not secured, to guard against frauds. • Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children. • Use of firewalls may be beneficial. 30
  • 31. 31
  • 32. • Provide for Contingencies if Critical Systems and Networks are Unavailable or Damaged – Determine alternate ways of processing data – Determine dependencies between systems and equipment – Determine backup personnel • The plan should be current and known 32
  • 33. 33
  • 34. • BEST BOOKS:- • >Hacking exposed by Stuart McClure • >Unofficial guide to ethical hacking by Ankit Fadia • >Google Hacks by Calishain & Cornets • BEST WEBSITES:- • >www.google.com • >www.securityfocus.com • >www.darkangel.pro.tcq • http://www.cybercrimelaw.org/index.cfm - Cybercrime Law • http://www.rbs2.com/ccrime.htm#anchor666666 - Computer Crimes, Ronald B. Standler 34
  • 35. 35