1358619756 cyber terrorism

15
CYBER TERRORISM PRESENTED BY NIDHI THAKUR -530 (AVEV II- CSE) A.G.G PRASANNA -502 (AVEV I I-CSE)

Upload: gayatri-aryasomayajula

Post on 14-Apr-2017

329 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: 1358619756 cyber terrorism

CYBERTERRORISM

PRESENTED BYNIDHI THAKUR -530 (AVEV II-CSE)A.G.G PRASANNA -502 (AVEV I I-CSE)

Page 2: 1358619756 cyber terrorism

INTRODUCTION• The use of Internet has

increased so much that even traditional concepts and methods of terrorism have a taken new dimension.

• Individuals or groups are using the anonymity cyberspace to threaten citizens, specific groups communities and even the countries.

Page 3: 1358619756 cyber terrorism

WHAT IS CYBERTERRORISM??• It is Internet based

attacks in terrorist activities

• It includes acts of large-scale disruption of computer networks

• Majorly personal computers attached to the Internet, by the means of tools such as computer viruses.

Page 4: 1358619756 cyber terrorism

EXAMPLES OF CYBERTERRORISM

Hacking into computer systems.

Introducing viruses to vulnerable networks.

Website Defacing. Denial-of-

Service(DOS) attacks.

Terroristic threats made via e-mail.

Page 5: 1358619756 cyber terrorism

3 MOST COMMON ATTACK METHODS

• IP spoofing• Password

Cracking • Denial-of-

service attacks

Page 6: 1358619756 cyber terrorism

IP SPOOFING

Creation of IP packets with forged source IP with the purpose of concealing the identity of sender

Used in Denial-of-Service attacks

Effective in corporate networks where users can log in without a username or password

Page 7: 1358619756 cyber terrorism

PASSWORD CRACKING• It usually referred to

repeated attempts to identify a user account or password and is called brute-force attacks

• It is implemented using brute-force attacks, Trojan horse programs and IP spoofing.

• Example is weak encryption used by Microsoft windows XP, can easily be attacked.

Page 8: 1358619756 cyber terrorism

DENIAL OF SERVICE ATTACKS• It focus on making a

service unavailable to intended users

• 2 forms of DoS attacks: a)crash services

b)flood services• One common attack

method involves saturating the target machine with communications requests such that it cannot respond to the traffic

Page 9: 1358619756 cyber terrorism

EXAMPLE OF CYBERTERRORISM ATTACKS

• 9/11 attack.• Ahmedabad bomb

blast.• 26/11 Mumbai

attack.

Page 10: 1358619756 cyber terrorism

9/11 TWIN TOWERS ATTACK

Al-Qaeda actively researchedpublicly available informationconcerning criticalinfrastructures posted on websites.

AHEMDABAD BOMB BLAST (26-07-08)

A mail with id alarbigujrat@ yahoo.com was being sent by a group of Terrorists.

Terrorists communicated with handlers in Pakistan through Call phonex using VoIP (Voice over Internet Protocol).

26/11 MUMBAI ATTACK

Page 11: 1358619756 cyber terrorism

Cyberterrorism against traditional terrorism

In the future, cyber

terrorism may become a feasible option to traditional physical acts of violence due to:

a. Perceived anonymity.b. Low risk of detection.c. Low investment.d. Operate from nearly

any location.e. Few resources are

needed.

Page 12: 1358619756 cyber terrorism

IMPACTS OF CYBERTERRORISM

• It has an immense impact on the world economy

• It possess the greatest threat to human lives, governments, organisations

• It has caused several deaths, market clashes, and has created deadliest scenario

Page 13: 1358619756 cyber terrorism

HOW TO PREVENT CYBERTERRORISM• Maintain high alert &

vigilance.• Update OS and

applications regularly.• Enforce strong

passwords.• “Lock down" systems.• Keep anti-virus

software installed and up-to-date.

• Employ intrusion detection systems and firewalls.

Page 14: 1358619756 cyber terrorism

CYBERTERRORISM

“Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb”

CONCLUSION

Page 15: 1358619756 cyber terrorism

THANK YOU

ANY QUERIES???