SlideShare uma empresa Scribd logo
1 de 14
Cyber-Terrorism
What is cyber-terrorism?
• "The premeditated, politically motivated attack
against information, computer systems, computer
programs, and data which result in violence against
noncombatant targets by sub-national groups or
clandestine agents". -FBI
• "The use of computer network tools to shut down
critical national infrastructure (such as energy,
transportation, government operations) or to
coerce or intimidate a government or civilian
population". -Center for Strategic/Int’l Studies
Types
• Logic Bombs
• Phishing
• Sniffer
• Trojan Horse
• Virus
• War Driving
• Worm
• Zero-Day Exploit
The cyber threat
• As our nations critical infrastructure becomes more
reliant on computer networks in order to operate,
there is an increased concern that these are
desired targets.
Examples
Electric Power System
Water Supply System
Air Traffic Control Systems
Healthcare Systems
Why cyber threats?
• Cyber terrorist prefer using the cyber attack
methods because of many advantages for it.
It is Cheaper than traditional methods.
• The action is very Difficult to be tracked.
• There are no physical barriers or check points to
cross.
• They can hide their personalities and location.
• They can use this method to attack a big number of
targets.
• They can do it remotely from anywhere in the world.
• They can affect a large number of people.
Cyber-terrorism Examples
• Started about mid1990s around the time of the internet
boom.
• 1997: Web site set up for Zapatistas, a Mexican rebel
group, to lead attacks against U.S. military from 1,500
locations in 50 different countries.
• 1999: NATO computers are blasted with e-mail bombs
and hit with denial-of-service attacks by hacktivists
protesting the bombings in Kosovo.
• 2000: Assassins hack into a hospital computer to change
the medication of a patient so that he would be given a
lethal injection. He was dead within a few hours.
Phishing
• Phishing is a way of attempting to acquire
information such as usernames, passwords,
and credit card details by masquerading as
a trustworthy entity in an electronic
communication. Communications
purporting to be from popular social web
sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public.
• Back
War driving
• War driving is the act of
searching for Wi-Fi wireless
networks by a person in a
moving vehicle, using a
portable computer,
smartphone or personal digital
assistant (PDA).
• Back
zero-day
• A zero-day (or zero-hour or day zero) attack
or threat is a computer threat that tries to
exploit computer application vulnerabilities
that are unknown to others or the software
developer. Zero-day exploits (actual
software that uses a security hole to carry
out an attack) are used or shared by
attackers before the developer of the target
software knows about the vulnerability.
• Back
Sniffer
• Sniffer may refer to:
• Packet analyzer (aka network analyzer, protocol
analyzer or sniffer), computer software or hardware that
can intercept and log traffic passing over a digital
network
• Allan Clarke (footballer), the Leeds Utd and England
striker known by that nickname
• a program that tracks a person straight to their IP and
computer
• equipment used in a car's tailpipe during an emissions
test
• equipment used as leak detector in vacuum technic
• Back
logic bomb
• A logic bomb is a piece of code
intentionally inserted into a software
system that will set off a malicious
function when specified conditions are
met. For example, a programmer may
hide a piece of code that starts
deleting files (such as a salary
database trigger), should they ever be
terminated from the company.
• Back
Trojan
• A Trojan may give a hacker
remote access to a targeted
computer system. Once a Trojan
has been installed on a targeted
computer system, hackers may be
given remote access to the
computer allowing them to
perform all kinds of operations
• Back
worm
• A computer worm is a standalone malware
computer program that replicates itself in order
to spread to other computers. Often, it uses a
computer network to spread itself. This is due to
security shortcomings on the target computer.
Unlike a computer virus, it does not need to
attach itself to an existing program. Worms
almost always cause at least some harm to the
network, even if only by consuming bandwidth,
whereas viruses almost always corrupt or modify
files on a targeted computer.
• Back
computer virus
• A computer virus is a computer program
that can replicate itself[1] and spread
from one computer to another. The term
"virus" is also commonly, but erroneously
used, to refer to other types of malware,
including but not limited to adware and
spyware programs that do not have a
reproductive ability
• Back

Mais conteúdo relacionado

Mais procurados

Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 

Mais procurados (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destaque

Catalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOMECatalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOMEWIKILAND
 
E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007Le Nin Real
 
"Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?""Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?"Stephen Leadholm
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 

Destaque (9)

Catalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOMECatalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOME
 
E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007
 
"Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?""Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?"
 
C01.8 terrorism
C01.8 terrorismC01.8 terrorism
C01.8 terrorism
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Terrorism
TerrorismTerrorism
Terrorism
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 

Semelhante a Cyber terrorism

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...Matthew J McMahon
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxSriArun9
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 

Semelhante a Cyber terrorism (20)

Brooks18
Brooks18Brooks18
Brooks18
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Mais de Hiren Selani

Unit 3 3 architectural design
Unit 3 3 architectural designUnit 3 3 architectural design
Unit 3 3 architectural designHiren Selani
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge managementHiren Selani
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
Application in manufacturing sector
Application in manufacturing sectorApplication in manufacturing sector
Application in manufacturing sectorHiren Selani
 
Application In service sector
Application In service sectorApplication In service sector
Application In service sectorHiren Selani
 
Development process of mis
Development process of misDevelopment process of mis
Development process of misHiren Selani
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISHiren Selani
 
Information,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceInformation,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceHiren Selani
 

Mais de Hiren Selani (14)

Digitalbusiness
DigitalbusinessDigitalbusiness
Digitalbusiness
 
Introduction
IntroductionIntroduction
Introduction
 
Unit 3 3 architectural design
Unit 3 3 architectural designUnit 3 3 architectural design
Unit 3 3 architectural design
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Process models
Process modelsProcess models
Process models
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge management
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Application in manufacturing sector
Application in manufacturing sectorApplication in manufacturing sector
Application in manufacturing sector
 
Application In service sector
Application In service sectorApplication In service sector
Application In service sector
 
Development process of mis
Development process of misDevelopment process of mis
Development process of mis
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MIS
 
System
SystemSystem
System
 
Information,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceInformation,Knowledge,Business intelligence
Information,Knowledge,Business intelligence
 
Decision making
Decision makingDecision making
Decision making
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Último (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Cyber terrorism

  • 2. What is cyber-terrorism? • "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents". -FBI • "The use of computer network tools to shut down critical national infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population". -Center for Strategic/Int’l Studies
  • 3. Types • Logic Bombs • Phishing • Sniffer • Trojan Horse • Virus • War Driving • Worm • Zero-Day Exploit
  • 4. The cyber threat • As our nations critical infrastructure becomes more reliant on computer networks in order to operate, there is an increased concern that these are desired targets. Examples Electric Power System Water Supply System Air Traffic Control Systems Healthcare Systems
  • 5. Why cyber threats? • Cyber terrorist prefer using the cyber attack methods because of many advantages for it. It is Cheaper than traditional methods. • The action is very Difficult to be tracked. • There are no physical barriers or check points to cross. • They can hide their personalities and location. • They can use this method to attack a big number of targets. • They can do it remotely from anywhere in the world. • They can affect a large number of people.
  • 6. Cyber-terrorism Examples • Started about mid1990s around the time of the internet boom. • 1997: Web site set up for Zapatistas, a Mexican rebel group, to lead attacks against U.S. military from 1,500 locations in 50 different countries. • 1999: NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo. • 2000: Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours.
  • 7. Phishing • Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. • Back
  • 8. War driving • War driving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA). • Back
  • 9. zero-day • A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or the software developer. Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability. • Back
  • 10. Sniffer • Sniffer may refer to: • Packet analyzer (aka network analyzer, protocol analyzer or sniffer), computer software or hardware that can intercept and log traffic passing over a digital network • Allan Clarke (footballer), the Leeds Utd and England striker known by that nickname • a program that tracks a person straight to their IP and computer • equipment used in a car's tailpipe during an emissions test • equipment used as leak detector in vacuum technic • Back
  • 11. logic bomb • A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company. • Back
  • 12. Trojan • A Trojan may give a hacker remote access to a targeted computer system. Once a Trojan has been installed on a targeted computer system, hackers may be given remote access to the computer allowing them to perform all kinds of operations • Back
  • 13. worm • A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. • Back
  • 14. computer virus • A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability • Back