SlideShare uma empresa Scribd logo
1 de 26
Cyber Terrorism  Presented By: Theresa, Doug & James
CONTENTS Title Page Content Page Definition of Cyber Terrorism A New Era Evolution of Terrorism  Background Information Effects of Cyber Terrorism History & Examples of Cyber Terrorism Countering Cyber Terrorism
Definition of Cyber Terrorism The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate a person in furtherance of such objectives.
A New Era is arising and within the past couple of years the United States and the rest of the World has been challenged with new tactics that have never been used or seen before.
Terrorism has evolved into an act that is not only unpredictable but is now able to affect us from all   Terrorism is the new terrorism that can affect not only affects us physically and mentally, but financially and emotionally as well.
Background Info on Cyber Terrorism Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and uncertainty about the millennium bug heightened and interest in potential cyber terrorist attacks also increased.”  We all remember when the year 2000 was near and the craze that began over what computers would and would not do.  Even the government was worried about national security during this time.
Effects of Cyber Terrorism Cyber terrorism can cause:  ,[object Object]
 Significant problems for national security and public policy that hasn't been dealt with in the past. If we don't step up security measures for computer networks, then cyber terrorism may become a useful tool for terrorist organizations to disrupt or possibly even shut down critical functions of that network.,[object Object]
EffectsofCyberTerrorismContinued: Water Supply System-  Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water
Effects of Cyber Terrorism      		          Continued: Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights.  -911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.
Effects of Cyber Terrorism      		           Continued: Healthcare Infrastructure- Now that most healthcare systems rely on the Internet cyber terrorism could potentially affect the healthcare facilities of a nation. Computerized medical, pharmacy, or health insurance records could be erased or altered
Effects of Cyber Terrorism      		           Continued: While all of these examples of critical infrastructure are just hypothetical, cyber terrorism is a real threat that we should deal with now rather than later when it's too late. Although no cyber terrorist attacks have happened yet, the risk of groups such as Al Qaeda using cyber terrorism is there. Some believe that cyber terrorism isn't an option for terrorists because it doesn't cause the physical damage, nor does it put fear in people, such as a bomb or other physical attack. Many others believe that terrorists would most likely use cyber terrorism as a "force multiplier" for a physical attack following it.If this is the case, the effects could be devastating if terrorists found a way to knock out power, water, telecommunications, and other critical infrastructure just before another large scale attack such as 9/11.
History/Background 1997: The Electronic Disturbance Theater (EDT) starts conducting Web "sit-ins" against various domains in support of the Zapatistas of Mexico. Thousands of protesters point their browser at a site using software that overloads the site with requests for downloads
History/Background 	 1997: Chaos Computer Club creates ActiveX Controls that trick Quicken into removing money from a user's account and transferring it someplace else.
History/Background 1998: Ethnic Tamil guerrillas swamped Sri Lanken embassies with over 800 e-mails a day for more than two weeks. Some say this was the first known attack by terrorists against a country's IT infrastructure.
History/Background 1999:NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo. 1999:Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours
History/Background 2001: After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights.  With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer
Countering Cyber Terrorism Because of this need the International Multilateral Partnership Against Cyber Threats (IMPACT) was formed.  -IMPACT  is the first global public-private initiative against cyber-terrorism. -IMPACT  is dedicated to bringing together governments, industry leaders and Cyber Security experts to enhance the global community’s capacity to prevent, defend and respond to Cyber Threats. -IMPACT’s global HQ facility is located in Cyberjaya, Malaysia
Countering Cyber Terrorism It’s extensive infrastructure contains training rooms, computer labs, auditorium, well-equipped meeting facilities and administrative offices.  -IMPACT acts as the foremost Cyber Threat resource center for the global community complete with an emergency response center to facilitate swift identification and sharing of available resources to assist member-governments during emergencies. -IMPACT’s role also includes establishing a comprehensive Early Warning System for the benefit of all member-countries and providing proactive protection across the globe.
Countering Cyber Terrorism The Department of Defense charged the United States Strategic Command with the duty of combating cyber terrorism.    Countering attacks is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.
Countering Cyber Terrorism Many issues are involved when dealing with countering cyber terrorism. For example, some people believe that their privacy and civil rights are at stake.  The question is: What’s more important our privacy or our protection?
EAGLE  EYE 2008 The "technology is everywhere" idea for "Eagle Eye" was hatched several  years ago from the brilliant mind of executive producer Steven Spielberg.  He wanted to do for electronic devices what he successfully did for sharks  in "Jaws." People feared going to the water after watching Spielberg's 1975 masterpiece but I doubt they will stop using technology because of "Eagle Eye."
LIVE FREE OR DIE HARD Thomas Gabriel is a talented computer hacker who was once a top expert for the National Security Agency, but was fired and his reputation smeared for trying to warn his superiors about the country's vulnerability to cyber attack. He has contacted a number of hackers across the United States, paying them handsomely to write code. However, after they have delivered their code, they are killed by a team of assassins sent by Mai, Gabriel's girlfriend.
Conclusion It is impossible to ignore the fact of how extreme Cyber Terrorism can and will be in the future to come. Cyber Terrorism may be more preventable then actual physical attacks on cities, civilians and other countries
REFERENCES wikipedia. (n.d.). Cyberterrorism. Retrieved July 3, 2009, from wikipedia.com: http://en.wikipedia.org/wiki/Cyberterrorism#Background_Information .http://faculty.ist.psu.edu/bagby/Fall05/346F05T4/intro.html http://www.youtube.com/watch?v=zCmJd6TI3w0 http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500
REFERENCES Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500 http://pdm.medicine.wisc.edu/18-3pdfs/272Clem.pdf http://www.impact-alliane.org Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, NJ & Columbus OH: Prentice Hall.

Mais conteúdo relacionado

Mais procurados (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Destaque

Optical Mark Recognition
Optical Mark RecognitionOptical Mark Recognition
Optical Mark RecognitionHimanshu Popli
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source softwareRob Jewitt
 
Search Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content SpamSearch Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content Spamjagadish thaker
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Search engines and its types
Search engines and its typesSearch engines and its types
Search engines and its typesNagarjuna Kalluru
 
The search engine index
The search engine indexThe search engine index
The search engine indexCJ Jenkins
 

Destaque (9)

Parts of cpu
Parts of cpuParts of cpu
Parts of cpu
 
Optical Mark Recognition
Optical Mark RecognitionOptical Mark Recognition
Optical Mark Recognition
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
 
Search Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content SpamSearch Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content Spam
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Types of Search Engines
Types of Search EnginesTypes of Search Engines
Types of Search Engines
 
Search engines and its types
Search engines and its typesSearch engines and its types
Search engines and its types
 
The search engine index
The search engine indexThe search engine index
The search engine index
 

Semelhante a Cyber Terrorism

document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research PaperRachel Phillips
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 

Semelhante a Cyber Terrorism (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 

Cyber Terrorism

  • 1. Cyber Terrorism Presented By: Theresa, Doug & James
  • 2. CONTENTS Title Page Content Page Definition of Cyber Terrorism A New Era Evolution of Terrorism Background Information Effects of Cyber Terrorism History & Examples of Cyber Terrorism Countering Cyber Terrorism
  • 3. Definition of Cyber Terrorism The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate a person in furtherance of such objectives.
  • 4. A New Era is arising and within the past couple of years the United States and the rest of the World has been challenged with new tactics that have never been used or seen before.
  • 5. Terrorism has evolved into an act that is not only unpredictable but is now able to affect us from all Terrorism is the new terrorism that can affect not only affects us physically and mentally, but financially and emotionally as well.
  • 6. Background Info on Cyber Terrorism Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and uncertainty about the millennium bug heightened and interest in potential cyber terrorist attacks also increased.” We all remember when the year 2000 was near and the craze that began over what computers would and would not do. Even the government was worried about national security during this time.
  • 7.
  • 8.
  • 9. EffectsofCyberTerrorismContinued: Water Supply System- Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water
  • 10. Effects of Cyber Terrorism Continued: Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights. -911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.
  • 11. Effects of Cyber Terrorism Continued: Healthcare Infrastructure- Now that most healthcare systems rely on the Internet cyber terrorism could potentially affect the healthcare facilities of a nation. Computerized medical, pharmacy, or health insurance records could be erased or altered
  • 12. Effects of Cyber Terrorism Continued: While all of these examples of critical infrastructure are just hypothetical, cyber terrorism is a real threat that we should deal with now rather than later when it's too late. Although no cyber terrorist attacks have happened yet, the risk of groups such as Al Qaeda using cyber terrorism is there. Some believe that cyber terrorism isn't an option for terrorists because it doesn't cause the physical damage, nor does it put fear in people, such as a bomb or other physical attack. Many others believe that terrorists would most likely use cyber terrorism as a "force multiplier" for a physical attack following it.If this is the case, the effects could be devastating if terrorists found a way to knock out power, water, telecommunications, and other critical infrastructure just before another large scale attack such as 9/11.
  • 13. History/Background 1997: The Electronic Disturbance Theater (EDT) starts conducting Web "sit-ins" against various domains in support of the Zapatistas of Mexico. Thousands of protesters point their browser at a site using software that overloads the site with requests for downloads
  • 14. History/Background 1997: Chaos Computer Club creates ActiveX Controls that trick Quicken into removing money from a user's account and transferring it someplace else.
  • 15. History/Background 1998: Ethnic Tamil guerrillas swamped Sri Lanken embassies with over 800 e-mails a day for more than two weeks. Some say this was the first known attack by terrorists against a country's IT infrastructure.
  • 16. History/Background 1999:NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo. 1999:Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours
  • 17. History/Background 2001: After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights. With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer
  • 18. Countering Cyber Terrorism Because of this need the International Multilateral Partnership Against Cyber Threats (IMPACT) was formed. -IMPACT is the first global public-private initiative against cyber-terrorism. -IMPACT is dedicated to bringing together governments, industry leaders and Cyber Security experts to enhance the global community’s capacity to prevent, defend and respond to Cyber Threats. -IMPACT’s global HQ facility is located in Cyberjaya, Malaysia
  • 19. Countering Cyber Terrorism It’s extensive infrastructure contains training rooms, computer labs, auditorium, well-equipped meeting facilities and administrative offices. -IMPACT acts as the foremost Cyber Threat resource center for the global community complete with an emergency response center to facilitate swift identification and sharing of available resources to assist member-governments during emergencies. -IMPACT’s role also includes establishing a comprehensive Early Warning System for the benefit of all member-countries and providing proactive protection across the globe.
  • 20. Countering Cyber Terrorism The Department of Defense charged the United States Strategic Command with the duty of combating cyber terrorism.   Countering attacks is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.
  • 21. Countering Cyber Terrorism Many issues are involved when dealing with countering cyber terrorism. For example, some people believe that their privacy and civil rights are at stake.  The question is: What’s more important our privacy or our protection?
  • 22. EAGLE EYE 2008 The "technology is everywhere" idea for "Eagle Eye" was hatched several years ago from the brilliant mind of executive producer Steven Spielberg. He wanted to do for electronic devices what he successfully did for sharks in "Jaws." People feared going to the water after watching Spielberg's 1975 masterpiece but I doubt they will stop using technology because of "Eagle Eye."
  • 23. LIVE FREE OR DIE HARD Thomas Gabriel is a talented computer hacker who was once a top expert for the National Security Agency, but was fired and his reputation smeared for trying to warn his superiors about the country's vulnerability to cyber attack. He has contacted a number of hackers across the United States, paying them handsomely to write code. However, after they have delivered their code, they are killed by a team of assassins sent by Mai, Gabriel's girlfriend.
  • 24. Conclusion It is impossible to ignore the fact of how extreme Cyber Terrorism can and will be in the future to come. Cyber Terrorism may be more preventable then actual physical attacks on cities, civilians and other countries
  • 25. REFERENCES wikipedia. (n.d.). Cyberterrorism. Retrieved July 3, 2009, from wikipedia.com: http://en.wikipedia.org/wiki/Cyberterrorism#Background_Information .http://faculty.ist.psu.edu/bagby/Fall05/346F05T4/intro.html http://www.youtube.com/watch?v=zCmJd6TI3w0 http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500
  • 26. REFERENCES Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500 http://pdm.medicine.wisc.edu/18-3pdfs/272Clem.pdf http://www.impact-alliane.org Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, NJ & Columbus OH: Prentice Hall.