Submitted by: Abhashree Pradhan 0501227096 8CA (1)

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
4 Information Security.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Chapter 9: Privacy, Crime, and Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Computer Crime and Information Technology Security
1 IS 8950 Managing Network Infrastructure and Operations.
Cyber crime & Security Prepared by : Rughani Zarana.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
7 Information Security.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Security CS Introduction to Operating Systems.
Awicaksi E-Commerce Security & Payment System E-Commerce.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Safety and Security issues of using ICT Alys brooks.
Hurdles in implementation of cyber security in India.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Sarvajanik college of engineering and technology. Created by:- Keshvi Khambhati (co-m) Ria Bhatia (co-m) Meghavi Gandhi (co-m) Jarul Mehta(co-m) Topic.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Cyber crime and security issues
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Securing Information Systems
Information Systems Security
Securing Information Systems
Seminar On Ethical Hacking Submitted To: Submitted By:
Data and database administration
CYBER SECURITY...
Cyber crime and security issues
Securing Information Systems
Security in Networking
Risk of the Internet At Home
Network Intrusion Responder Program
The Internet of Unsecure Things
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
CYBERTERRORISM.
Presentation transcript:

Submitted by: Abhashree Pradhan CA (1)

CONTENTS  Introduction  New risks and threats  Cause of cyber attack  Vulenarability types  Methods of cyber terrorism  Examples  Steps for prevention  Conclusion

INTRODUCTION Cyberterrorism is a criminal act Perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.

New Risks and Threats  Globalization of infrastructures increases level of vulnerability  Easy access to infrastructures via Internet and Public Switched Telecommunications Network  Interdependencies of systems make attack consequences harder to predict and perhaps more severe due to the cascading effects  Malicious tools and recipes for new cyber weapons are widely available and do not require a high degree of technical skill to use

WHY CYBER ATTACK S?  It is Cheaper than traditional methods.  They can hide their personalities and location.  They can use this method to attack a big number of targets.  The action is very Difficult to be tracked.

Vulnerability Types.Computer based  Poor passwords.Facility based  Servers in unprotected areas  Inadequate physical security measures Lack of appropriate firewall protection

TERRORIST GROUPS

METHODS OF CYBER TERRORISM  Some of weapons:  Radio frequency weapons/High powered microwave  Transient electrmagnetic device  Viruses,Logic bombs,Trojan horse  Denial of services

RF WEAPONS  Fries the electrical component of target  Consists of power source, apparatus to generate RF, antenna  RF energy entered through frontend/backend  Expensive, complex, require more power, large in size

TRANSIENT ELECTROMAGNETIC DEVICE  Emits a large” spike “burst of energy  Spike targets large spectrum of space  Smaller, cheaper, technically supported

ELECTRO MAGNETIC BOMBS  Creats electromagnetic pulse  It creats current between 10 to 1000 times greater than a lightening strike

 Logic bombs: It is a program that may be maliciously modified to fail when certain conditions are met.  Trojan horse: A program that overtly does one thing while covertly doing another.  Virus: A specific type of Trojan horse that can be used to spread its “infection” from one computer to another.

HACKTISM Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example: ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.

Cyber Facilitated Terrorism Cyber Facilitated Terrorism is terrorism using cyber means as a tool for accomplishing the act. Example: A terrorist sends an message to a Senator stating that 50 anonymous letters have been sent to the office, each containing large amounts of anthrax.

EXAMPLES OF CYBER TERRORISM  Terrorists created an active x control for internet that can trick quicken accounting program into removing money from user’s account  Created viruses and trojan horses to make networks useless  Hacking the hospital computers  Spreading different rumor through internet  Threaten large banks

PREVENTION OF CYBER TERRORISM Cources offered free of charges to technical perssonel from public safety, law enforcement,health care providers Implement network design Improve modern technology Analyze modern and emerging attack methodology Operate various software tools /services commonly used by attackers to surveil

STEPS TAKEN FOR PREVENTION  Back up critical informatipon  Authenticate network users  Create mechanism for reporting problems in workplace  Reduce system vulnerability in attack situation

FUTURE OF CYBER TERRORISM I n the future, cyberterrorism may become a viable option to traditional physical acts of violence due to:  Anonymity  Diverse targets  Low risk of detection  Low risk of personnel injury  Low investment  Operate from nearly any location  Few resources are neede

CONCLUSION  Cyber terrorism can be reduced by creating the awareness programmes between people and developing security system of computers

REFFERENCES  

THANK YOU