SlideShare a Scribd company logo
1 of 4
INFORAMTION ASSURANCES AND CYBER DEFENSE
                                       INTRODUCTION
It is not clear whether the Cyber-Terrorist is real or simply a theoretical class of adversary. Very
little intelligence or other data exist in open literature that characterizes the behavior or existence
of this class of adversary. We will argue that the Cyber-Terrorist is a very real potential threat to
modern information systems. Therefore, sophisticated defenders must understand the capabilities
and behavior of this adversary in order to defend against it. The Defense Advanced Research
Projects Agency‟s (DARPA‟s) Information Assurance (IA) Program is attempting .To
incorporate the Cyber-Terrorist Into a larger model of threats poised against information systems
operated by the US Department of Defense. This paper lists some of the basic assumptions about
this adversary, with the intent that these assumptions may be challenged within the research
community.
                                         HYPOTHESIS

Information systems that manage the nation‟s defenses and critical infrastructures are vulnerable
to cyber attacks.


                                 PROBLEM STATEMENT
             The problem of defending the nation from a cyber attack is complicated.
                               SIGNIFICANCE OF STUDY

The project is designed to develop conceptual and analytical understanding about the initiatives
that must be taken in order to secure the Cyber technology. This project helps me to understand
the objective to identify common threats and attacks employed against Web-accessible
applications. We analyze and explain the role of cryptography, and scrutinize issues related to
security management and network security.

                                      RESEARCH QUESTION



What is Cyber attack: Is your critical infrastructure is safe?
Is Anatomy of sophisticated IT is vulnerable to Cyber attack?
Is cyber attack is a threat not just to our national security, but also to our economic edge and way
of life?
Are Cyber-attacks on critical infrastructure representing a threat to both governments and the
private sector?
Should the National Guard and reserve members‟ role be expended to support cyberspace roles
and functions?




                                        LITERATURE REVIEW


In article (2009)“IATAC’s Critical Role in Information Assurance and Cyber
Security “by Gene Tyler, Dr. Ron Ritchey, and Karen Mercedes Goertzel
Authors analyzed the Measuring Cyber Security and Information Assurance which provides a
broad picture of the current stat e of cyber security and information assurance, as well as a
comprehensive look at the progress made in measurement discipline. The security of our nation
depends on the survivability, authenticity, and continuity of information systems. These systems
are vulnerable to external attacks, due in part to the necessary dependence on commercial
systems and the increased use of the Internet. Security of information systems is also of supreme
importance to the war fighter in defending our national security.
With the increasing amount of concern and Information Warfare (IW) activities requiring rapid
responses, it is difficult to ensure that all appropriate agencies and organizations are given the
knowledge and tools to protect from, react to, and defend against IW attacks. The Information
Assurance Technology Analysis Center (IATAC) is institution for facilitating the sharing of
Information Assurance (IA) and cyber security information throughout government, industry,
and academia so that individuals can gain access to knowledge and tools essential for effective
computer network defense.
In book “CYBER SECURITY ESSENTIALS” had written by Rick Howard, James J. Graham,
Richard Howard 15 dec, (2010). The book then essentially provides an „introduction‟ to the „subject‟
of Cyber Security. It covers the main concepts involved in identifying potential threats, vulnerabilities and
the procedures necessary to combat them, but does not provide a comprehensive, detailed description on
the subject of Cyber Security.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work.
Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts
behind prevalent threats, tactics, and procedures.


The subject content does provide an overview of current threats and trends, which, as outlined above, are
broken down and explained in simple terms, including the issue of program code exploits (reasonable
details provided on this). Diagrams are used well, enhancing the reader‟s understanding of the subject
matter and relevant references are provided where necessary.

Cyber Security, by its very nature, tends to be technical, and explaining technical concepts to the business
can often be challenging. This book aims to help in this area by removing the technical jargon as far as
possible and substituting these with simple terms to explain technical aspects. Does it work? Well,
almost; like many other complicated subjects where the author tries to make the topics accessible to the
layman, some of the important stuff gets lost in translation! To accomplish this, the team of security professionals from
VeriSign‟s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those
new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff.
Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations,
exploitation trends, malicious code techniques, and the latest threat vectors


            Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical
             understanding
            Supplies actionable advice for the mitigation of threats
            Breaks down the code used to write exploits into understandable diagrams


This book is not about the latest attack trends or botnets. It‟s about the reasons why these problems continue to plague us. By better understanding the logic
presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the
threats and attacks on the horizon




                                             RESEARCH METHODOLOGY
Researchers use secondary data for this research project by applying the methodology of
descriptive and analytical research. Data was collected from different websites, books, and
newspaper articles. Additional research was pursued utilizing college and university websites
that posted studies of similar matters. Furthermore, books written by experts were examined and
relevant information was extracted to reinforce the views within this text. A logical analysis of
the material was conducted and presented in this paper.


                                                              LIMITATIONS
      1. Being female researcher it was for researchers to go outside for searching data.
      2. Time span was very limited for dealing with such a complex and recent topic.
      3. Lack of good literature available in Fatima Jinnah Women University.
TENTATIVE OUTLINE/STRUCTURE OF STUDY

             CHAPTER 1



             CHAPTER 2



             CHAPTER 3



             CHAPTER 4

             CHAPTER 5




              CONCLUSION

More Related Content

What's hot

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...PacificResearchPlatform
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learningPadmaSelvaraj4
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
Cyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCharles Li
 

What's hot (20)

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
CV
CVCV
CV
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learning
 
Deception towards Moving Target Defense
Deception towards Moving Target DefenseDeception towards Moving Target Defense
Deception towards Moving Target Defense
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Cyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive Era
 

Viewers also liked

T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.Madhav Vyas
 
2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applicationsudayudu
 
Evoluion of western diet chronic disease for cuny copy
Evoluion of western diet  chronic disease  for cuny copyEvoluion of western diet  chronic disease  for cuny copy
Evoluion of western diet chronic disease for cuny copynmaki
 
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho
 
03.04 power point
03.04 power point03.04 power point
03.04 power pointamyfwest
 

Viewers also liked (16)

T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.
 
El slides
El slidesEl slides
El slides
 
How To Create Killer Recruiting Content
How To Create Killer Recruiting ContentHow To Create Killer Recruiting Content
How To Create Killer Recruiting Content
 
Emotions. For kids
Emotions. For kidsEmotions. For kids
Emotions. For kids
 
2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications
 
Mis
MisMis
Mis
 
Sourcer's Daily Dozen - Glenn Gutmacher
Sourcer's Daily Dozen - Glenn GutmacherSourcer's Daily Dozen - Glenn Gutmacher
Sourcer's Daily Dozen - Glenn Gutmacher
 
Mimsism's 1 & 2
Mimsism's 1 & 2Mimsism's 1 & 2
Mimsism's 1 & 2
 
Coaching
CoachingCoaching
Coaching
 
skolskit
skolskitskolskit
skolskit
 
Evoluion of western diet chronic disease for cuny copy
Evoluion of western diet  chronic disease  for cuny copyEvoluion of western diet  chronic disease  for cuny copy
Evoluion of western diet chronic disease for cuny copy
 
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
 
Usb idazteko plantilla
Usb idazteko plantillaUsb idazteko plantilla
Usb idazteko plantilla
 
03.04 power point
03.04 power point03.04 power point
03.04 power point
 
Chủ đề 2
Chủ đề 2Chủ đề 2
Chủ đề 2
 
Pjk akhir tahun
Pjk akhir tahunPjk akhir tahun
Pjk akhir tahun
 

Similar to Cyber terrorism.. sir summar

Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingOluseyi Akindeinde
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Maurice Dawson
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmapAjay Ohri
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxstudywriters
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxbkbk37
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceJacklynTsai
 

Similar to Cyber terrorism.. sir summar (20)

Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_Modeling
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Internet Safety Essay.pdf
Internet Safety Essay.pdfInternet Safety Essay.pdf
Internet Safety Essay.pdf
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat Intelligence
 

Recently uploaded

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Cyber terrorism.. sir summar

  • 1. INFORAMTION ASSURANCES AND CYBER DEFENSE INTRODUCTION It is not clear whether the Cyber-Terrorist is real or simply a theoretical class of adversary. Very little intelligence or other data exist in open literature that characterizes the behavior or existence of this class of adversary. We will argue that the Cyber-Terrorist is a very real potential threat to modern information systems. Therefore, sophisticated defenders must understand the capabilities and behavior of this adversary in order to defend against it. The Defense Advanced Research Projects Agency‟s (DARPA‟s) Information Assurance (IA) Program is attempting .To incorporate the Cyber-Terrorist Into a larger model of threats poised against information systems operated by the US Department of Defense. This paper lists some of the basic assumptions about this adversary, with the intent that these assumptions may be challenged within the research community. HYPOTHESIS Information systems that manage the nation‟s defenses and critical infrastructures are vulnerable to cyber attacks. PROBLEM STATEMENT The problem of defending the nation from a cyber attack is complicated. SIGNIFICANCE OF STUDY The project is designed to develop conceptual and analytical understanding about the initiatives that must be taken in order to secure the Cyber technology. This project helps me to understand the objective to identify common threats and attacks employed against Web-accessible applications. We analyze and explain the role of cryptography, and scrutinize issues related to security management and network security. RESEARCH QUESTION What is Cyber attack: Is your critical infrastructure is safe?
  • 2. Is Anatomy of sophisticated IT is vulnerable to Cyber attack? Is cyber attack is a threat not just to our national security, but also to our economic edge and way of life? Are Cyber-attacks on critical infrastructure representing a threat to both governments and the private sector? Should the National Guard and reserve members‟ role be expended to support cyberspace roles and functions? LITERATURE REVIEW In article (2009)“IATAC’s Critical Role in Information Assurance and Cyber Security “by Gene Tyler, Dr. Ron Ritchey, and Karen Mercedes Goertzel Authors analyzed the Measuring Cyber Security and Information Assurance which provides a broad picture of the current stat e of cyber security and information assurance, as well as a comprehensive look at the progress made in measurement discipline. The security of our nation depends on the survivability, authenticity, and continuity of information systems. These systems are vulnerable to external attacks, due in part to the necessary dependence on commercial systems and the increased use of the Internet. Security of information systems is also of supreme importance to the war fighter in defending our national security. With the increasing amount of concern and Information Warfare (IW) activities requiring rapid responses, it is difficult to ensure that all appropriate agencies and organizations are given the knowledge and tools to protect from, react to, and defend against IW attacks. The Information Assurance Technology Analysis Center (IATAC) is institution for facilitating the sharing of Information Assurance (IA) and cyber security information throughout government, industry, and academia so that individuals can gain access to knowledge and tools essential for effective computer network defense. In book “CYBER SECURITY ESSENTIALS” had written by Rick Howard, James J. Graham, Richard Howard 15 dec, (2010). The book then essentially provides an „introduction‟ to the „subject‟ of Cyber Security. It covers the main concepts involved in identifying potential threats, vulnerabilities and the procedures necessary to combat them, but does not provide a comprehensive, detailed description on the subject of Cyber Security.
  • 3. The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. The subject content does provide an overview of current threats and trends, which, as outlined above, are broken down and explained in simple terms, including the issue of program code exploits (reasonable details provided on this). Diagrams are used well, enhancing the reader‟s understanding of the subject matter and relevant references are provided where necessary. Cyber Security, by its very nature, tends to be technical, and explaining technical concepts to the business can often be challenging. This book aims to help in this area by removing the technical jargon as far as possible and substituting these with simple terms to explain technical aspects. Does it work? Well, almost; like many other complicated subjects where the author tries to make the topics accessible to the layman, some of the important stuff gets lost in translation! To accomplish this, the team of security professionals from VeriSign‟s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‟s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon RESEARCH METHODOLOGY Researchers use secondary data for this research project by applying the methodology of descriptive and analytical research. Data was collected from different websites, books, and newspaper articles. Additional research was pursued utilizing college and university websites that posted studies of similar matters. Furthermore, books written by experts were examined and relevant information was extracted to reinforce the views within this text. A logical analysis of the material was conducted and presented in this paper. LIMITATIONS 1. Being female researcher it was for researchers to go outside for searching data. 2. Time span was very limited for dealing with such a complex and recent topic. 3. Lack of good literature available in Fatima Jinnah Women University.
  • 4. TENTATIVE OUTLINE/STRUCTURE OF STUDY CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 CONCLUSION