1358619756 cyber terrorism

Post on 14-Apr-2017

329 Views

Category:

Engineering

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

CYBERTERRORISM

PRESENTED BYNIDHI THAKUR -530 (AVEV II-CSE)A.G.G PRASANNA -502 (AVEV I I-CSE)

INTRODUCTION• The use of Internet has

increased so much that even traditional concepts and methods of terrorism have a taken new dimension.

• Individuals or groups are using the anonymity cyberspace to threaten citizens, specific groups communities and even the countries.

WHAT IS CYBERTERRORISM??• It is Internet based

attacks in terrorist activities

• It includes acts of large-scale disruption of computer networks

• Majorly personal computers attached to the Internet, by the means of tools such as computer viruses.

EXAMPLES OF CYBERTERRORISM

Hacking into computer systems.

Introducing viruses to vulnerable networks.

Website Defacing. Denial-of-

Service(DOS) attacks.

Terroristic threats made via e-mail.

3 MOST COMMON ATTACK METHODS

• IP spoofing• Password

Cracking • Denial-of-

service attacks

IP SPOOFING

Creation of IP packets with forged source IP with the purpose of concealing the identity of sender

Used in Denial-of-Service attacks

Effective in corporate networks where users can log in without a username or password

PASSWORD CRACKING• It usually referred to

repeated attempts to identify a user account or password and is called brute-force attacks

• It is implemented using brute-force attacks, Trojan horse programs and IP spoofing.

• Example is weak encryption used by Microsoft windows XP, can easily be attacked.

DENIAL OF SERVICE ATTACKS• It focus on making a

service unavailable to intended users

• 2 forms of DoS attacks: a)crash services

b)flood services• One common attack

method involves saturating the target machine with communications requests such that it cannot respond to the traffic

EXAMPLE OF CYBERTERRORISM ATTACKS

• 9/11 attack.• Ahmedabad bomb

blast.• 26/11 Mumbai

attack.

9/11 TWIN TOWERS ATTACK

Al-Qaeda actively researchedpublicly available informationconcerning criticalinfrastructures posted on websites.

AHEMDABAD BOMB BLAST (26-07-08)

A mail with id alarbigujrat@ yahoo.com was being sent by a group of Terrorists.

Terrorists communicated with handlers in Pakistan through Call phonex using VoIP (Voice over Internet Protocol).

26/11 MUMBAI ATTACK

Cyberterrorism against traditional terrorism

In the future, cyber

terrorism may become a feasible option to traditional physical acts of violence due to:

a. Perceived anonymity.b. Low risk of detection.c. Low investment.d. Operate from nearly

any location.e. Few resources are

needed.

IMPACTS OF CYBERTERRORISM

• It has an immense impact on the world economy

• It possess the greatest threat to human lives, governments, organisations

• It has caused several deaths, market clashes, and has created deadliest scenario

HOW TO PREVENT CYBERTERRORISM• Maintain high alert &

vigilance.• Update OS and

applications regularly.• Enforce strong

passwords.• “Lock down" systems.• Keep anti-virus

software installed and up-to-date.

• Employ intrusion detection systems and firewalls.

CYBERTERRORISM

“Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb”

CONCLUSION

THANK YOU

ANY QUERIES???

top related