SlideShare uma empresa Scribd logo
1 de 19
Cyber Terrorism -Global Threat- Carl Barrett Itayi Bunhu
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Cyber Terrorism ,[object Object],[object Object],[object Object]
What is Cyber Terrorism ,[object Object],[object Object],[object Object]
First acts of Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object]
First acts of Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Terrorism - Can This Happen ,[object Object],[object Object],[object Object],[object Object]
The Cost of Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Vulnerability  Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial  nuclear plants 1,600 municipal wastewater facilities 2 million miles of pipelines 66,000 chemical plants 5,800 registered hospitals E-commerce 2 billion miles of cable 5,000 airports 300 maritime ports 300,000 production sites 120,000 miles of major rails 3,000 govt. facilities Home Users Broadband Connections Wireless Viruses, Worms Banking Telecom Emergency Services Chemical Rail Natural Gas Water Waste Water Transportation Oil 80,000 Dams Insiders Configuration Problems 150,000 miles transmission lines 130 overlapping grid controllers Electric
How are we protected from cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS INTELLIGENCE GATHERING TO PROTECT US ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS THE DIFFERENCE BETWEEN CYBER CRIME AND CYBER TERRORISM ,[object Object],[object Object]
How is it done? ,[object Object],[object Object]
How is it done? ,[object Object],[object Object]
Summary and Conclusion ,[object Object],[object Object],[object Object],[object Object]
Summary and Conclusion ,[object Object],[object Object],[object Object],[object Object]
Summary and Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ,[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Password Attacks.pdf
Password Attacks.pdfPassword Attacks.pdf
Password Attacks.pdfAndy32903
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber securitymahendra_chauhan
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 

Mais procurados (20)

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Password Attacks.pdf
Password Attacks.pdfPassword Attacks.pdf
Password Attacks.pdf
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 

Semelhante a Cyberterrorismv1 (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Cyberterrorismv1

  • 1. Cyber Terrorism -Global Threat- Carl Barrett Itayi Bunhu
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. The Vulnerability Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial nuclear plants 1,600 municipal wastewater facilities 2 million miles of pipelines 66,000 chemical plants 5,800 registered hospitals E-commerce 2 billion miles of cable 5,000 airports 300 maritime ports 300,000 production sites 120,000 miles of major rails 3,000 govt. facilities Home Users Broadband Connections Wireless Viruses, Worms Banking Telecom Emergency Services Chemical Rail Natural Gas Water Waste Water Transportation Oil 80,000 Dams Insiders Configuration Problems 150,000 miles transmission lines 130 overlapping grid controllers Electric
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Notas do Editor

  1. 1 – On line Webster's dictionary 2 – FBI
  2. According to the book Cyber terrorism: the use of the internet for terrorist purposes – compiled by the council of Europe The continued growing use and access of the internet is leading to this being a breeding ground for the new terrorist, the cyber terrorist The intent of these cyber terrorist is largely a three pronged: ECONOMIC CONFUSION – MEANING TO SHOW THE VULNERABILITY OF STATE AND ORGANIZATION DISCRIMINATION OF OPPONENT – SIMILAR TO THE ABOVE BUT SHOWING THEIR SUPERIORITY TECHNICALLY MONETARY INCOME – SELF EXPLANATORY BUT WILL PROVIDE FUNDS NEEDED FOR FUTURE TERRORIST ENDEAVORS
  3. According to Time magazine article A Brief History of Cybercrime By Randy James Monday, Jun. 01, 2009 Telephone networks were first targets Corporate and academic networks DOS This attack method floods web servers, and networks with requests from many different computers at once. When these servers are flooded with so many requests, they can't process them all and freeze-up, or shut down. This can be a major problem to websites or networks vital to the national security infrastructure Read more: http://www.time.com/time/nation/article/0,8599,1902073,00.html#ixzz1I2klXctq
  4. The Internet encyclopedia, Volume 1   By Hossein Bidgoli In the 1980s, Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term "cyber terrorism" to refer to the convergence of cyberspace and terrorism Listed modern cyber terrorism - remotely changing pressure in gas lines – explosions fires - computerized bombs remotely detonated using unique numeric patterns if one doesn’t detonate the others detonate simultaneously - Future air traffic attacks – mid air collisions etc
  5. Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy Dorothy E. Denning Georgetown University Collins - potential threats Food manufacturing – increasing chemicals or additives to make food not safe Air Traffic – disrupting navigation systems Remote bombing – placement of bombs to explode simultaneously Utilities disruption – knocking out service FBI Manufacturing – workers would notice increase in ingredients Air traffic – controllers and radar Utilities – alarmed services
  6. 5 http://www.directionsmag.com/articles/cyber-terrorism/123840 Probability of occurrence of cyber terrorism - graph The cost Direct Cost Implications Loss of sales during the disruption Staff time, network delays, intermittent access for business users Increased insurance costs due to litigation Loss of intellectual property - research, pricing, etc. Costs of forensics for recovery and litigation Loss of critical communications in time of emergency Indirect Cost Implications Loss of confidence and credibility in our financial systems Tarnished relationships& public image globally Strained business partner relationships - domestic and internationally Loss of future customer revenues for an individual or group of companies Loss of trust in the government and computer
  7. Dan Verton Vice President & Executive Editor www.itsecuritymagazine.com This slide represents the vulnerability of the united states to cyber terrorism and the areas of where attacks could take place. Utilities Banking Government Telco Transportation
  8. 1 – On line websters dictionary 2 – FBI
  9. 1 – On line websters dictionary 2 – FBI
  10. 1 – On line websters dictionary 2 – FBI
  11. 1 – On line websters dictionary 2 – FBI
  12. 1 – On line websters dictionary 2 – FBI
  13. III. Cyber Security Cyber threats to our national security are broad in nature, from acts of terrorism supported by the use of the Internet, to economic espionage by foreign countries, to sophisticated state- sponsored hackers. Such threats could compromise our national critical infrastructure, from energy, water, telecommunications and transportation systems to financial services. Cyber Threats With regard to the terrorist use of the Internet, terrorists have not used the Internet to launch a full-scale cyber attack. But terrorist sympathizers have used the Internet to hide their communications, attempted denial-of-service attacks, and defaced numerous websites. And while the damage may have been limited, such groups may attack for publicity or impact, and they are becoming more adept at both. The FBI, with our partners in the intelligence community, believes that the threat from the terrorist use of the Internet is a growing terrorist threat area. We speculate they will either train their own recruits or hire outsiders, with an eye toward leveraging physical attacks with use of the internet. The cyber threat is equally significant with regard to counterintelligence intrusions and economic espionage. Today, our adversaries sit within our networks, often unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target both government and corporate networks. They seek our technology and our trade secrets, our intelligence and our intellectual property, even our military weapons and strategies. The FBI is actively pursuing each of these threats. We have cyber squads in each of our 56 field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence. They share information with our law enforcement and intelligence partners, including the Secret Service, which also has strong capabilities in this area. And they teach their counterparts - both at home and abroad - how best to investigate cyber threats. But the FBI cannot do it alone. The National Cyber Investigative Joint Task Force includes 20 law enforcement and intelligence agencies, working side by side to share intelligence and to identify key players and schemes. The goal is to predict and prevent what is on the horizon, and to pursue the enterprises behind these attacks. Last year`s takedown of the Mariposa botnet is but one example of that collaboration. As you may know, Mariposa was an information- stealing botnet - one that infected millions of computers, including major banks and other Fortune 1000 companies. And this case, like so many others, emphasized the need for global cooperation. We look forward to working with Congress as it considers whether it should enact legislation requiring companies to report significant breaches of their network security to the FBI and other law enforcement agencies in real time. Such a requirement would promote coordination between appropriate agencies to investigate intrusions, identify the bad actors, and take actions to prevent further damage.
  14. 1 – On line Webster's dictionary 2 – FBI
  15. 1 – On line Webster's dictionary 2 – FBI
  16. 1 – On line Webster's dictionary 2 – FBI
  17. 1 – On line Webster's dictionary 2 – FBI