790 likes | 1.92k Vues
Submitted by: Abhashree Pradhan 0501227096 8CA (1). CYBER TERRORISM. CONTENTS. Introduction New risks and threats Cause of cyber attack Vulenarability types Methods of cyber terrorism Examples Steps for prevention Conclusion. INTRODUCTION.
E N D
Submitted by: AbhashreePradhan 0501227096 8CA (1) CYBER TERRORISM
CONTENTS • Introduction • New risks and threats • Cause of cyber attack • Vulenarabilitytypes • Methods of cyber terrorism • Examples • Steps for prevention • Conclusion
INTRODUCTION Cyberterrorism is a criminal act Perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.
New Risks and Threats • Globalization of infrastructures increases level of vulnerability • Easy access to infrastructures via Internet and Public Switched Telecommunications Network • Interdependencies of systems make attack consequences harder to predict and perhaps more severe due to the cascading effects • Malicious tools and recipes for new cyber weapons are widely available and do not require a high degree of technical skill to use
WHY CYBER ATTACK S? • It is Cheaper than traditional methods. • They can hide their personalities and location. • They can use this method to attack a big number of targets. • They can use this method to attack a big number of targets. • The action is very Difficult to be tracked.
Vulnerability Types .Computer based • Poor passwords .Facility based • Servers in unprotected areas • Inadequate physical security measures Lack of appropriate firewall protection
METHODS OF CYBER TERRORISM • Some of weapons: • Radio frequency weapons/High powered microwave • Transient electrmagnetic device • Viruses,Logicbombs,Trojan horse • Denial of services
RF WEAPONS • Fries the electrical component of target • Consists of power source, apparatus to generate RF , antenna • RF energy entered through frontend/backend • Expensive , complex, require more power, large in size
TRANSIENT ELECTROMAGNETIC DEVICE • Emits a large” spike “burst of energy • Spike targets large spectrum of space • Smaller, cheaper, technically supported
ELECTRO MAGNETIC BOMBS • Creats electromagnetic pulse • It creats current between 10 to 1000 times greater than a lightening strike
Logic bombs: It is a program that may be maliciously modified to fail when certain conditions are met. • Trojan horse: A program that overtly does one thing while covertly doing another. • Virus: A specific type of Trojan horse that can be used to spread its “infection” from one computer to another.
HACKTISM Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.
Cyber Facilitated Terrorism Cyber Facilitated Terrorism is terrorism using cyber means as a tool for accomplishing the act. Example: A terrorist sends an email message to a Senator stating that 50 anonymous letters have been sent to the office, each containing large amounts of anthrax.
EXAMPLES OF CYBER TERRORISM • Terrorists created an active x control for internet that can trick quicken accounting program into removing money from user’s account • Created viruses and trojan horses to make networks useless • Hacking the hospital computers • Spreading different rumor through internet • Threaten large banks
PREVENTION OF CYBER TERRORISM Cources offered free of charges to technical perssonel from public safety, law enforcement ,health care providers Implement network design Improve modern technology Analyze modern and emerging attack methodology Operate various software tools /services commonly used by attackers to surveil
STEPS TAKEN FOR PREVENTION • Back up critical informatipon • Authenticate network users • Create mechanism for reporting problems in workplace • Reduce system vulnerability in attack situation
FUTURE OF CYBER TERRORISM In the future, cyberterrorism may become a viable option to traditional physical acts of violence due to: • Anonymity • Diverse targets • Low risk of detection • Low risk of personnel injury • Low investment • Operate from nearly any location • Few resources are neede
CONCLUSION • Cyber terrorism can be reduced by creating the awareness programmes between people and developing security system of computers
REFFERENCES • WWW.Google.com • www.wikipedia.com