Cyber terrorism

793 views

Published on

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
793
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
35
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber terrorism

  1. 1. CYBER TERRORISM
  2. 2. DEFINATION • According to the U.S. Federal Bureau of Investigation, cyber terrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by sub-national groups or agents.“  Political agenda  Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths)  Civilians as targets  Publicity Terrorism has evolved into an act that is not only terrorism that can affect us physically and mentally, but financially and emotionally as well.
  3. 3. War with tanks and bombs is now old story, a new era of terrorism with computers is started .
  4. 4. Background of Cyber Terrorism • Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and interest in potential cyber terrorist attacks also increased. We all remember when the year 2000 was near and the craze that began over what computers would and would not do. Even the government was worried about national security during this time. • After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights. With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer
  5. 5. WHAT IS THE DIFFERENCE BETWEEN CYBER CRIME AND CYBER TERRORISM • Cybercrime can involve theft of intellectual property, a violation of patent, trade secret, or copyright laws. However, cybercrime also includes attacks against computers to deliberately disrupt processing, or may include espionage to make unauthorized copies of classified data. • Cyber Terrorism can be defined in different ways. It can be unlawful attacks and threats of attack against computers, networks and the information stored there in when done to intimidate or coerce a government ,this is treated as political agenda .
  6. 6. Why Use Cyber Warfare • Low barriers to entry – laptops cost a lot less than tanks • Complex societies are dependent on computers and networks • Online Banking and money storage • Companies stores data online • Different Countries
  7. 7. HOW
  8. 8. Effects - Harming effects on economy - Damages to websites - Effect on national security - Cyber Terrorism ranges from simple hacking and computer viruses to causing of terror war using computer Pakistan sets death penalty for cyber terrorism
  9. 9. Physical effects by Cyber Terrorism • Electric Power System- The electrical power grid is a probable target for cyber terrorists. If the computer systems controlling these systems could be disrupted or shut down it could knock out power for many. This could lead to potential deaths if the system isn't recovered in a timely manner. • Water Supply System- Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water • Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights. • 911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.
  10. 10. Difficulties in Defense • Many entry points to internet, most networks • Difficult to trace attacks – Many from robot networks (botnets) of compromised PCs • Internet created for convenience, not security – Internet technology does not support easy defense • Unknown capabilities of other nations, groups – So, little deterrence exists • “Security is a process, not a product” – Bruce Schneier • Defenders have to defend against many possible attacks, but attackers only have to find one hole
  11. 11. • Go on the defensive now – Educate senior management on risks of cyber warfare – Make information security a top priority – Enhance security technology

×