Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.

Similar presentations


Presentation on theme: "CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT."— Presentation transcript:

1 CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT

2 WHAT IS CYBER TERRORISM? Cyber terrorism is defined by the FBI as “any premeditated, politically motivated attack against information, computer systems, computer programs, network and data, which results in violence, disruption, or damage against non-combatant targets by sub-national groups or clandestine agents.” Cyber attacks are often facilitated with readily available and easy to use software tools. These tools are often free online.

3 TYPES OF CYBER TERRORISM Computer Viruses Computer program that spreads by inserting copies of itself into executable code or documents Denial of Service Attacks Assault on a network that floods it with so many additional requests or transactions that regular traffic is slowed or halted. Software Vulnerability Exploitation Software vulnerabilities are exploited with software containing code that can be used in a malicious fashion.

4 WHAT IS AFFECTED? According to the U.S. Commission of Critical Infrastructure Protection, possible targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. This could allow terrorists to take out central parts of our nations networks.

5 POTENTIAL CYBERATTACKS No catastrophic cyberterroristic attack has yet to occur ZDNet cited worst-case scenarios  Train collisions by hijacking of operations  Hijacking of major utility networks  Attack on major water providers  Major financial networks Cyberterroristic activities could have rippling effects throughout the world

6 LIKELIHOOD OF ATTACKS At this point, no catastrophic event has taken place In 2002, CSIS noted that more than 3,000 vulnerabilities would need to be found within the public and private sector utility providers’ systems to take over major infrastructure entities In 2006, US Dept. of Homeland Security issued a warning that al-Qaeda might be planning an attack against stock market and banking systems.  Attack never came

7 PREVENTING CYBERTERRORISTIC ATTACKS In 1997, President Clinton created Commission on Critical Information Protection This created Presidential Decision Directive 63, which named 15 critical infrastructure sectors – still in use today. Also encouraged establishment of Information Sharing and Analysis Centers to streamline federal, state, and local efforts. After Sept. 11 attacks President signed executive order making Office of Homeland Security responsible for nation’s critical infrastructure protection  Dept. of Homeland Security took over responsibility on Nov. 25, 2002

8 RECENT GOVERNMENT ACTION President Obama has taken a strong stand against cyber attacks He signed a secret directive permitting military to act more aggressively in response to cyber attacks on nation’s private and govt. computer networks  Named Policy Directive 20  Established broad and strict set of standards to guide the operation’s of federal agencies in confronting threats in cyberspace Rumored that President Obama will sign an executive order, pushing stronger cybersecurity protection Senate failed to pass Cyber Security Act of 2012 for a second time EO will implement at least some elements from CSA 2012. EO will create council that will determine which govt. agencies regulate the sects of our nation’s critical infrastructure

9 RECENT GOVERNMENT ACTION, CONT. Govt. will also mandate:  Govt. information sharing about threats  Draft voluntary standards for critical infrastructure industries to follow  Strenghten cybersecurity oversight by regulatory agencies  Pressure private firms to increase security through federal standards

10 CONCLUSION Cyberterrorism is a growing concern in today’s society. According to Dr. Edward Maggio in his article Terrorism: Cyber Terrorism, “in the past minute there have been approximately 54,000 serious computer attacks reported to hackerwatch.org” Businesses and policy makers, as well as us as individuals need to work to find a solution to not only combating but preventing this problem in the future.

11 REFERENCES "9/11 10 Years Later: Protecting Critical Infrastructure." Homeland Security Digital Library (HSDL). The Naval Post Graduate School for Homeland Defense and Security, 23 Aug. 2011. Web. 02 Dec. 2012.. Armerding, Taylor. "Demise of Cybersecurity Bill Means Executive Order on the Way." CSO. CXO Media, Inc., 21 Nov. 2012. Web. 02 Dec. 2012.. Arvidson, Erik. "What Does Cyberterrorism Affect?" EHow. Demand Media, 30 July 2011. Web. 02 Dec. 2012.. Maggio, Edward J. "Survival Insights." Survival Insights. N.p., 07 Feb. 2012. Web. 27 Nov. 2012.. Nakashima, Ellen. "Obama Signs Secret Directive to Help Thwart Cyberattacks." Washington Post. The Washington Post, 14 Nov. 2012. Web. 02 Dec. 2012.. Roberts, Adam. "The Changing Faces of Terrorism." BBC News. BBC, 27 Aug. 2002. Web. 02 Dec. 2012..


Download ppt "CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT."

Similar presentations


Ads by Google