Why it is so attractive to the terrorist?
What the cyber terrorist can do?
Types of attack
Instance of cyber terrorism
What can be done about cyber terrorism?
What is Cyber terrorismWhat is Cyber terrorism ??
Cyber terrorism is any act of
terrorism that uses information systems
or digital technology (computers or
computer networks) as either an
instrument or a target. Cyber terrorism
can either be "international", "domestic"
or "political", according to the nature of
the act, but it is always an act involving a
combination of the terrorist and the
increased anonymity and difficult to detect
difficult to counter such acts
Intra and inter-group communication and coordination
Information and intelligence gathering
Ease of operations that are cost-effective, both in terms of
resources used, and ability to strike worldwide.
Why it so attractive to the terroristWhy it so attractive to the terrorist??
What the cyber terrorist can doWhat the cyber terrorist can do??
Rapid communication of threats to a wide or specific audience
Threats to public utilities and transportation
Threats to commercial institutions and transnational
Threats to individuals
Threats to political groups or other ethnic, religious
or nationalist entities (all of these can include other terrorist
groups) identified as "the enemy"
Threats to security forces
Threats to nations
Types of attackTypes of attack::
Unauthorized access & hacking
Virus and worm attack
E-mail & IRC related crimes
Denial of service attacks
Instance of cyber terrorismInstance of cyber terrorism ::
In 1998, Spanish protestors bombarded the Institute for
Global Communications (IGC) with thousands of bogus e-
In 1998, ethnic Tamil guerrillas swamped Sri Lankan
embassies with 800 e-mails a day over a two-week period.
The messages read "We are the Internet Black Tigers and
we're doing this to disrupt your communications."
During the Kosovo conflict in 1999, NATO computers were
blasted with e-mail bombs and hit with denial-of-service
attacks by hacktivists protesting the NATO bombings.
Use strong passwords: use passwords that are difficult or
impossible to guess. Give different passwords to all accounts.
Make regular backup’s of critical data: Backup’s must be done
atleast once each day.
Use virus protection software this means three things having it in
your computer check daily for new virus signature updates and then
Use firewall as a gatekeeper between your computer and
Preventive MeasuresPreventive Measures ::
Do not keep computers online when not in use: either shut
them or disconnect them from Internet connection.
Do not open e-mail attachments from strangers. Regularly
down load security.
This seminar is provide insights on the dangers of cyber
terrorism. The world over need to be aware of the problem
areas of information systems that may be susceptible to
terrorist attacks, to be able to attempt putting an end to such
activity. There are a large number of ethical issues to be taken
into consideration, as well. For example, there are sites on the
Internet that deal with methods of making bombs, and sites
from which these materials can be purchased. This information
is available to everybody. However, if an individual acted on this
information, and made a bomb with evil intentions, then one
could not blame technology, but society, for producing such a
person. Technology must be used for the betterment of
mankind, not with the intent of destroying what He created.
To view this presentation, first, turn up your volume and second, launch the self-running slide show.
Steps 3 and 5 are of interest primarily to law enforcement personnel to identify and prosecute Phishers. The discussion of technology countermeasures will center on ways to disrupt steps 1, 2 and 4, as well as related technologies outside the information flow proper.