Download presentation
Presentation is loading. Please wait.
Published byFrederick Patrick Modified over 9 years ago
1
Submitted by: Abhashree Pradhan 0501227096 8CA (1)
2
CONTENTS Introduction New risks and threats Cause of cyber attack Vulenarability types Methods of cyber terrorism Examples Steps for prevention Conclusion
3
INTRODUCTION Cyberterrorism is a criminal act Perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.
4
New Risks and Threats Globalization of infrastructures increases level of vulnerability Easy access to infrastructures via Internet and Public Switched Telecommunications Network Interdependencies of systems make attack consequences harder to predict and perhaps more severe due to the cascading effects Malicious tools and recipes for new cyber weapons are widely available and do not require a high degree of technical skill to use
5
WHY CYBER ATTACK S? It is Cheaper than traditional methods. They can hide their personalities and location. They can use this method to attack a big number of targets. The action is very Difficult to be tracked.
6
Vulnerability Types.Computer based Poor passwords.Facility based Servers in unprotected areas Inadequate physical security measures Lack of appropriate firewall protection
7
TERRORIST GROUPS
8
METHODS OF CYBER TERRORISM Some of weapons: Radio frequency weapons/High powered microwave Transient electrmagnetic device Viruses,Logic bombs,Trojan horse Denial of services
9
RF WEAPONS Fries the electrical component of target Consists of power source, apparatus to generate RF, antenna RF energy entered through frontend/backend Expensive, complex, require more power, large in size
10
TRANSIENT ELECTROMAGNETIC DEVICE Emits a large” spike “burst of energy Spike targets large spectrum of space Smaller, cheaper, technically supported
11
ELECTRO MAGNETIC BOMBS Creats electromagnetic pulse It creats current between 10 to 1000 times greater than a lightening strike
12
Logic bombs: It is a program that may be maliciously modified to fail when certain conditions are met. Trojan horse: A program that overtly does one thing while covertly doing another. Virus: A specific type of Trojan horse that can be used to spread its “infection” from one computer to another.
13
HACKTISM Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.
14
Cyber Facilitated Terrorism Cyber Facilitated Terrorism is terrorism using cyber means as a tool for accomplishing the act. Example: A terrorist sends an email message to a Senator stating that 50 anonymous letters have been sent to the office, each containing large amounts of anthrax.
15
EXAMPLES OF CYBER TERRORISM Terrorists created an active x control for internet that can trick quicken accounting program into removing money from user’s account Created viruses and trojan horses to make networks useless Hacking the hospital computers Spreading different rumor through internet Threaten large banks
16
PREVENTION OF CYBER TERRORISM Cources offered free of charges to technical perssonel from public safety, law enforcement,health care providers Implement network design Improve modern technology Analyze modern and emerging attack methodology Operate various software tools /services commonly used by attackers to surveil
17
STEPS TAKEN FOR PREVENTION Back up critical informatipon Authenticate network users Create mechanism for reporting problems in workplace Reduce system vulnerability in attack situation
18
FUTURE OF CYBER TERRORISM I n the future, cyberterrorism may become a viable option to traditional physical acts of violence due to: Anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are neede
19
CONCLUSION Cyber terrorism can be reduced by creating the awareness programmes between people and developing security system of computers
20
REFFERENCES WWW.Google.com WWW.Google.com www.wikipedia.com
21
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.