2. What is cyber-terrorism?
• "The premeditated, politically motivated attack
against information, computer systems, computer
programs, and data which result in violence against
noncombatant targets by sub-national groups or
clandestine agents". -FBI
• "The use of computer network tools to shut down
critical national infrastructure (such as energy,
transportation, government operations) or to
coerce or intimidate a government or civilian
population". -Center for Strategic/Int’l Studies
4. The cyber threat
• As our nations critical infrastructure becomes more
reliant on computer networks in order to operate,
there is an increased concern that these are
desired targets.
Examples
Electric Power System
Water Supply System
Air Traffic Control Systems
Healthcare Systems
5. Why cyber threats?
• Cyber terrorist prefer using the cyber attack
methods because of many advantages for it.
It is Cheaper than traditional methods.
• The action is very Difficult to be tracked.
• There are no physical barriers or check points to
cross.
• They can hide their personalities and location.
• They can use this method to attack a big number of
targets.
• They can do it remotely from anywhere in the world.
• They can affect a large number of people.
6. Cyber-terrorism Examples
• Started about mid1990s around the time of the internet
boom.
• 1997: Web site set up for Zapatistas, a Mexican rebel
group, to lead attacks against U.S. military from 1,500
locations in 50 different countries.
• 1999: NATO computers are blasted with e-mail bombs
and hit with denial-of-service attacks by hacktivists
protesting the bombings in Kosovo.
• 2000: Assassins hack into a hospital computer to change
the medication of a patient so that he would be given a
lethal injection. He was dead within a few hours.
7. Phishing
• Phishing is a way of attempting to acquire
information such as usernames, passwords,
and credit card details by masquerading as
a trustworthy entity in an electronic
communication. Communications
purporting to be from popular social web
sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public.
• Back
8. War driving
• War driving is the act of
searching for Wi-Fi wireless
networks by a person in a
moving vehicle, using a
portable computer,
smartphone or personal digital
assistant (PDA).
• Back
9. zero-day
• A zero-day (or zero-hour or day zero) attack
or threat is a computer threat that tries to
exploit computer application vulnerabilities
that are unknown to others or the software
developer. Zero-day exploits (actual
software that uses a security hole to carry
out an attack) are used or shared by
attackers before the developer of the target
software knows about the vulnerability.
• Back
10. Sniffer
• Sniffer may refer to:
• Packet analyzer (aka network analyzer, protocol
analyzer or sniffer), computer software or hardware that
can intercept and log traffic passing over a digital
network
• Allan Clarke (footballer), the Leeds Utd and England
striker known by that nickname
• a program that tracks a person straight to their IP and
computer
• equipment used in a car's tailpipe during an emissions
test
• equipment used as leak detector in vacuum technic
• Back
11. logic bomb
• A logic bomb is a piece of code
intentionally inserted into a software
system that will set off a malicious
function when specified conditions are
met. For example, a programmer may
hide a piece of code that starts
deleting files (such as a salary
database trigger), should they ever be
terminated from the company.
• Back
12. Trojan
• A Trojan may give a hacker
remote access to a targeted
computer system. Once a Trojan
has been installed on a targeted
computer system, hackers may be
given remote access to the
computer allowing them to
perform all kinds of operations
• Back
13. worm
• A computer worm is a standalone malware
computer program that replicates itself in order
to spread to other computers. Often, it uses a
computer network to spread itself. This is due to
security shortcomings on the target computer.
Unlike a computer virus, it does not need to
attach itself to an existing program. Worms
almost always cause at least some harm to the
network, even if only by consuming bandwidth,
whereas viruses almost always corrupt or modify
files on a targeted computer.
• Back
14. computer virus
• A computer virus is a computer program
that can replicate itself[1] and spread
from one computer to another. The term
"virus" is also commonly, but erroneously
used, to refer to other types of malware,
including but not limited to adware and
spyware programs that do not have a
reproductive ability
• Back