NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Philippine Cybercrime Efforts
THE CYBER-TERRORISM THREAT: FINDINGS FROM A SURVEY OF RESEARCHERS Lee Jarvis, Stuart Macdonald and Lella Nouri (all Swansea University)
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Cyberterrorism. Critical Infrastructure Vulnerability.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Introduction to Security Computer Networks Computer Networks Term B10.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
CYBER CRIME AND SECURITY TRENDS
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Submitted by: Abhashree Pradhan CA (1)
Securing Information Systems
Cyber crime & Security Prepared by : Rughani Zarana.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Introduction to Computer Ethics
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Hurdles in implementation of cyber security in India.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber crime and security issues
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Securing Information Systems
What is Cyber Security Cyber War Cyber Power?
Disaster and Emergency Management
Cybersecurity, competence and preparedness
Educause/Internet 2 Computer and Network Security Task Force
Network Security Fundamentals
Instructor Materials Chapter 7 Network Security
Cyber crime and security issues
Systems Security Keywords Protecting Systems
Southwark Prevent programme
Seminar On Cyber Crime Submitted To: Submitted By:
Threats to computers Andrew Cormack UKERNA.
Panel Discussion: C4I Solutions for Combating
Assalamualaikum Today, I am going to give a presentation on
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Today’s Risk. Today’s Solutions. Cyber security and
Risk of the Internet At Home
Network Intrusion Responder Program
Forensics Week 12.
(Discussion – The Department of Defense)
Chapter 13 Security and Ethical Challenges.
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
COUNTERING VIOLENT EXTREMISM: IMPACT ON GLOBAL GOVERNANCE
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Faculty of Science IT Department By Raz Dara MA.
Internet Vulnerabilities & Criminal Activity
Networking for Home and Small Businesses – Chapter 8
Forensic and Investigative Accounting
National Information Assurance (NIA) Policy
Computer Security.
Computer Security By: Muhammed Anwar.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Marcial Quinones-Cardona
Presentation transcript:

NANDHA ENGINEERING COLLEGE ERODE-52

CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED BYPRESENTED BYS.INDHUJA G.KEERTHANA PREETHIG.KEERTHANA PREETHI

Objective:  Revenge  Politics  Protest  Disrupt the activities of an enemy country

CYBER WARCYBER WAR The use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems. The use of computers to disrupt the activities of an enemy country, especially the deliberate attacking of communication systems.

Cyberterrorism Definition 1. Political agenda 2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3. Civilians as targets 4. Publicity 5. Non-state actors Traditional Terrorism definition: Use of violence

Cyber TerrorismCyber Terrorism  Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Internetterroristcomputer virusesInternetterroristcomputer viruses

 Cyber terrorism can be also defined as the intentional use of computer networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this is a form of terrorism.

Attack TargetsAttack Targets  Cell phone worms.  Rootkits.  Trojans.  Spreading virus via trojans.

Distributed denial-of-service attack (DDoS)Distributed denial-of-service attack (DDoS)  A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. denial of servicedenial of service  The flood of incoming messages to the target system essentially forces it to shut down. Types:  Network centric attack (bandwidth)  Application layer attack(app., calls)

Cyberspace:  The term cyberspace has become a conventional means to describe anything associated with the Internet and the diverse Internet culture. Internet cultureInternet culture  Amongst individuals on cyberspace, there is believed to be a code of shared rules and ethics mutually beneficial for all to follow, referred to as cyberethics. cyberethics

Threats in Cyberspace 1. Hacktivism 2. Cybercrime 3. Cyber terrorism

Levels of Cyber Terrorism:  Simple Un-Structured  Advanced –Structured  Complex coordinated

The Nature of the Internet: Strength and Weaknesses Redundancy Wireless Vulnerabilities and flaws can be corrected Flaws Reliance on private sector

Cyber securityCyber security  Complex security risks and challenges.  Limiting the risk to data before attacks occur is accomplished through risk assessment &management.

Solutions: We provide the following ProActive&ReActivetechniqs : P eventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and other crash courses. P eventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and other crash courses.

Area Of ResearchArea Of Research Cyber TerrorismCyber Terrorism

Disadvantages: We need to be very careful how and were we put data on the web. The US is attacked millions of times daily. If someone were to break through our cyber security it could have a huge impact. It could take hours to days to fix a breach in security. Advantages: Using Cyber Warfare we can obtain critical information on our enemies. New job opportunities in the IT world in this field, especially for military

Conclusion: o Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. o The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application o f the laws more stringent to check crime. ://

Thank You