Anúncio

Cyber terrorism

system analyst
14 de Sep de 2015
Anúncio

Mais conteúdo relacionado

Anúncio

Último(20)

Cyber terrorism

  1. AgendaAgenda ::  Introduction  Why it is so attractive to the terrorist?  What the cyber terrorist can do?  Types of attack  Instance of cyber terrorism  What can be done about cyber terrorism?  Preventive measures
  2. What is Cyber terrorismWhat is Cyber terrorism ?? Cyber terrorism is any act of terrorism that uses information systems or digital technology (computers or computer networks) as either an instrument or a target. Cyber terrorism can either be "international", "domestic" or "political", according to the nature of the act, but it is always an act involving a combination of the terrorist and the computer.
  3.  increased anonymity and difficult to detect  difficult to counter such acts  Intra and inter-group communication and coordination  Information and intelligence gathering  Financing  Recruitment  Ease of operations that are cost-effective, both in terms of resources used, and ability to strike worldwide. Why it so attractive to the terroristWhy it so attractive to the terrorist??
  4. What the cyber terrorist can doWhat the cyber terrorist can do??  Rapid communication of threats to a wide or specific audience  Threats to public utilities and transportation  Threats to commercial institutions and transnational corporations  Threats to individuals  Threats to political groups or other ethnic, religious or nationalist entities (all of these can include other terrorist groups) identified as "the enemy"  Threats to security forces  Threats to nations
  5. Types of attackTypes of attack::  Unauthorized access & hacking  Trojan attack  Virus and worm attack  E-mail & IRC related crimes  Email spoofing  Email spamming  Email bombing  Denial of service attacks  Forgery
  6. Instance of cyber terrorismInstance of cyber terrorism ::  In 1998, Spanish protestors bombarded the Institute for Global Communications (IGC) with thousands of bogus e- mail messages.  In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications."  During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings.
  7.  Simple-unstructured  Advance-structured  Complex-coordinated Cyber terror capabilitiesCyber terror capabilities ::
  8. Use strong passwords: use passwords that are difficult or impossible to guess. Give different passwords to all accounts. Make regular backup’s of critical data: Backup’s must be done atleast once each day. Use virus protection software this means three things having it in your computer check daily for new virus signature updates and then scan it. Use firewall as a gatekeeper between your computer and Internet. Preventive MeasuresPreventive Measures ::
  9. Do not keep computers online when not in use: either shut them or disconnect them from Internet connection. Do not open e-mail attachments from strangers. Regularly down load security.
  10. ConclusionConclusion :: This seminar is provide insights on the dangers of cyber terrorism. The world over need to be aware of the problem areas of information systems that may be susceptible to terrorist attacks, to be able to attempt putting an end to such activity. There are a large number of ethical issues to be taken into consideration, as well. For example, there are sites on the Internet that deal with methods of making bombs, and sites from which these materials can be purchased. This information is available to everybody. However, if an individual acted on this information, and made a bomb with evil intentions, then one could not blame technology, but society, for producing such a person. Technology must be used for the betterment of mankind, not with the intent of destroying what He created.
  11. ReferencesReferences  www.cyberlawindia.com  www.seminarsonly.com  www.cybercrimejournal.com

Notas do Editor

  1. To view this presentation, first, turn up your volume and second, launch the self-running slide show.
  2. Steps 3 and 5 are of interest primarily to law enforcement personnel to identify and prosecute Phishers. The discussion of technology countermeasures will center on ways to disrupt steps 1, 2 and 4, as well as related technologies outside the information flow proper.
Anúncio