Download presentation
1
Cracking down on international cyberterrorism
presentation BY SUNNY PATEL, DARIA POTAPOVA, RYAN RICHARDS
2
WHY CYBERTERRORISM IS IMPORTANT?
Cyber terrorism – the use of computing resources to imitate or coerce others. Hacking is the leading cause of data breaches; Hacking groups are typically loosely affiliated and rapidly expanding (which makes them very dangerous). They may include members from around the world and the number of members can range from tens to thousands; Hacked data is irrelevant, biased and unreliable for auditors and accountants, which can potentially cost thousands to the companies. The FBI defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. Cyber-terrorism could thus be defined as the use of computing resources to intimidate or coerce others. An example of cyber-terrorism could be hacking into a hospital computer system and changing someone's medicine prescription to a lethal dosage as an act of revenge. It sounds far fetched, but these things can and do happen. Hacking groups are typically loosely affiliated, rapidly expanding (which makes them very dangerous), include members from around the world and the number of members range from tens to thousands; Hacked data is irrelevant, biased and unreliable for auditors and accountants, which can potentially cost thousands to the companies.
3
Why government’s role in cracking down cyber terrorism is important
Number of attacks by hackers is increasing – companies need to have effective systems of internal controls in place to prevent, detect and correct the attacks. Companies need help in fighting those attacks. Governments need to take responsibility and crack down on these cyber terrors. Our group decided to explore this topic because we think that government’s role in cracking down cyber terrorism is very important. Since the number of attacks by hackers is increasing, it is very important that each organization that is publicly funded has an effective internal control system that includes countermeasures to prevent, detect and correct breaches. We are facing a cyberwar from both domestic and international terrorists and that makes it difficult to create a one size fits all countermeasure. Nevertheless, governments need to take responsibility and crack down on these cyber terrors.
4
Anonymous Emerged in 2003 on the imageboard 4chan online chat
Has no leaders, no hierarchical structure, and no geographical epicenter
5
anonymous Many members are motivated by freedom of information;
Famous for coordinating a range of disconnected actions from trolling to political protests; Technically, the group is open to all and has no boundaries to participation; Many members of Anonymous are motivated by freedom of information. Technically, the group is open to all and has no boundaries to participation. Authority and order within the group come in form of policies, ethical sensibilities and norms, which develop over time and ‘often continuously formed and reformed in reaction to historical events’. Recently they hacked into the networks of Stratfor, a security news site. Hackers associated with Anonymous have apparently stolen subscriber information, including names and credit cards from the security news site of Stratfor.
6
Lulzsec Small in size, but performed significant damages;
Main reason for attacks is for lulz Helped raise the public awareness about hackers Lulzsec did not participate in selling hacked information Lulzsec is a smaller hacking group compared to Anonymous but they have also been able to perform as significant damages as Anonymous. They are famous for attacks against AT&T, Sony, Disney, Viacom, Nato, AOL and many other private and public organizations. Big score for Lulzsec was when they successfully attacked and compromised the Central Intelligence Agency website. Some security professionals claim that LulzSec helped raise the public awareness about the inefficiency of current protection against hackers and lack of security controls in many high-profile organizations. Picture: the way PBS website looked after Lulzsec hacked it in retaliation against the network for a “Frontline” documentary about wikileaks. Unlike other cybercriminals and affiliated groups, LulzSec did not participiate in selling hacked information. Instead LulzSec was involved in posting it to public forums because they believed it should be free and available to everyone. The group’s agenda can be summarized by the following question which they asked after one of their attacks: ‘Why do you put such faith in a company that allows itself to become open to these simple attacks?’
7
Red hacker alliance Largest hacking group in the world;
‘an independent confederation of patriotic youth dedicated to defending China against perceived threats to national dignity’ Was formed in response to the 1998 ethnic riots in Indonesia; Many consider affiliation of Chinese government to RHA; Since it’s origination RHA has been involved in at least five major cyber conflicts; In terms of membership, Red Hacker Alliance is believed to the largest hacking group in the world with approximately 80,000 hackers worldwide. Red Hacker Alliance was formed in response to the 1998 ethnic riots in Indonesia. The Indonesian nationals were unfairly blaming the Chinese community for their country’s bad economic conditions. Indonesian citizens turned to violence, killing many Chinese nationals, destroying their homes and businesses along the way. In retaliation, several Chinese individual hackers formed the “Chinese Hacker Emergency Conference Center” in which they began conducting denial-of-service attacks against Indonesian domestic businesses and hacking Indonesian government websites. Many consider affiliation of Chinese government to RHA; Since it’s origination RHA has been involved in at least five major cyber conflicts;
8
Red hacker alliance Attacks: CNN Against the US Geological survey NASA
Cornell University More than 100 other US government and business sites One of Red Hackers Alliance most recent attacks was in 2008 when they successful breached the CNN system. The attack happened because the group, at the time, believed that westerns news network, including CNN, were purposefully distorting news stories concerning China, its peoples and its interests. The intentions of this group are a real threat to IT security in the Western nations and information security personnel should familiarize themselves with them. Red Hacker Alliance has recently increased their numbers when the hacking group Hanker Union amalgamated with them. In 2001 it announced and encouraged its members via the homepage message on it website to attack the networks of government and business organizations in the United States. At one point it even played a game of one-upmanship, where one hacker executes an attack and another hacker follows with an even bigger attack (Harris, 2001). Since declaring war on the United States and it business organizations, The group has claimed responsibility for attacks against the US Geological Survey, NASA, Cornell University and more than 100 other US government and business sites since 30 April of that year .
9
Government responses to hackers
Properly train government personnel Investment in research and development Promote international cooperation among governments; crucial to fighting cyber terrorism worldwide. Raise the security levels on critical accounting infrastructures, where the detection and response of an intrusion is immediate.
10
Governments Response to hackers (cont’d)
United States In 2008, then-President Bush created the Comprehensive National Cybersecurity Initiative (CNCI) Establishing a front line defense by creating shared situational awareness to improve the government’s ability to prevent intrusions Europe Europol, a European law enforcement agency February 28, 2012, Europol arrested four individuals in a coordinated operation against hacktivists claiming to be part of the Anonymous collective
11
Governments Response to hackers (cont’d)
Canada Created Canada’s Cyber Security Strategy in 2010 Purpose is to “invest in securing the Government of Canada systems, as well as partnering with other governments and with industry to ensure systems vital to Canadian security are protected.” China Enacted new laws to fight cyber-terrorism despite controversies of China’s involvement New law enacted prosecutes the “acquisition of computer system data or control of computer systems and prohibit supplying programs or tools for the purpose of intrusion into computer systems “
12
Conclusion: Few simple things to protect yourself from cyber-terrorism: All company accounts should have passwords and the passwords should be difficult to unfold; Network configurations should be changed when defects become known; Check with venders for upgrades and patches; Audit systems and check logs to help in detecting and tracing an intruder.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.