CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.

Slides:



Advertisements
Similar presentations
Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
1 Protecting the Long Island Business Community A Public Safety Partnership.
David A. Brown Chief Information Security Officer State of Ohio
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
National Infrastructure Protection Plan
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Cyberterrorism. Critical Infrastructure Vulnerability.
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Lecture 11 Reliability and Security in IT infrastructure.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
CYBER CRIME AND SECURITY TRENDS
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Submitted by: Abhashree Pradhan CA (1)
BCP of Japanese Securities Industry July 5, 2007 Japan Securities Clearing Corporation.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Computer Security By Duncan Hall.
Keystone XL Source: Gale Courey Toensing, “Republicans Threaten Keystone Rider to Must-Pass Legislation if Obama Vetoes,” Indian Country Today Media Network,
Chapter 17: Foreign Policy and National Defense Section 2.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Presented by Solomon Ingba David Afoenyi Afure Iloka Niteabai Domininc.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Tomorrow’s Battleground Nicholas Jabbour Alice Culbertson.
Disaster and Emergency Management
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Understanding the Threats of and Defenses Against Cyber Warfare
Computer Security Fundamentals
California Cybersecurity Integration Center (Cal-CSIC)
The Federal Bureaucracy
Securing Information Systems
Presidential Approaches to Cybersecurity
NERC Cyber Security Standard
Protect Your Ecommerce Site From Hacking and Fraud
Our Cloud Services Journey
Deborah Housen-Couriel, ADV.
Presentation transcript:

CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT

WHAT IS CYBER TERRORISM? Cyber terrorism is defined by the FBI as “any premeditated, politically motivated attack against information, computer systems, computer programs, network and data, which results in violence, disruption, or damage against non-combatant targets by sub-national groups or clandestine agents.” Cyber attacks are often facilitated with readily available and easy to use software tools. These tools are often free online.

TYPES OF CYBER TERRORISM Computer Viruses Computer program that spreads by inserting copies of itself into executable code or documents Denial of Service Attacks Assault on a network that floods it with so many additional requests or transactions that regular traffic is slowed or halted. Software Vulnerability Exploitation Software vulnerabilities are exploited with software containing code that can be used in a malicious fashion.

WHAT IS AFFECTED? According to the U.S. Commission of Critical Infrastructure Protection, possible targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. This could allow terrorists to take out central parts of our nations networks.

POTENTIAL CYBERATTACKS No catastrophic cyberterroristic attack has yet to occur ZDNet cited worst-case scenarios  Train collisions by hijacking of operations  Hijacking of major utility networks  Attack on major water providers  Major financial networks Cyberterroristic activities could have rippling effects throughout the world

LIKELIHOOD OF ATTACKS At this point, no catastrophic event has taken place In 2002, CSIS noted that more than 3,000 vulnerabilities would need to be found within the public and private sector utility providers’ systems to take over major infrastructure entities In 2006, US Dept. of Homeland Security issued a warning that al-Qaeda might be planning an attack against stock market and banking systems.  Attack never came

PREVENTING CYBERTERRORISTIC ATTACKS In 1997, President Clinton created Commission on Critical Information Protection This created Presidential Decision Directive 63, which named 15 critical infrastructure sectors – still in use today. Also encouraged establishment of Information Sharing and Analysis Centers to streamline federal, state, and local efforts. After Sept. 11 attacks President signed executive order making Office of Homeland Security responsible for nation’s critical infrastructure protection  Dept. of Homeland Security took over responsibility on Nov. 25, 2002

RECENT GOVERNMENT ACTION President Obama has taken a strong stand against cyber attacks He signed a secret directive permitting military to act more aggressively in response to cyber attacks on nation’s private and govt. computer networks  Named Policy Directive 20  Established broad and strict set of standards to guide the operation’s of federal agencies in confronting threats in cyberspace Rumored that President Obama will sign an executive order, pushing stronger cybersecurity protection Senate failed to pass Cyber Security Act of 2012 for a second time EO will implement at least some elements from CSA EO will create council that will determine which govt. agencies regulate the sects of our nation’s critical infrastructure

RECENT GOVERNMENT ACTION, CONT. Govt. will also mandate:  Govt. information sharing about threats  Draft voluntary standards for critical infrastructure industries to follow  Strenghten cybersecurity oversight by regulatory agencies  Pressure private firms to increase security through federal standards

CONCLUSION Cyberterrorism is a growing concern in today’s society. According to Dr. Edward Maggio in his article Terrorism: Cyber Terrorism, “in the past minute there have been approximately 54,000 serious computer attacks reported to hackerwatch.org” Businesses and policy makers, as well as us as individuals need to work to find a solution to not only combating but preventing this problem in the future.

REFERENCES "9/11 10 Years Later: Protecting Critical Infrastructure." Homeland Security Digital Library (HSDL). The Naval Post Graduate School for Homeland Defense and Security, 23 Aug Web. 02 Dec Armerding, Taylor. "Demise of Cybersecurity Bill Means Executive Order on the Way." CSO. CXO Media, Inc., 21 Nov Web. 02 Dec Arvidson, Erik. "What Does Cyberterrorism Affect?" EHow. Demand Media, 30 July Web. 02 Dec Maggio, Edward J. "Survival Insights." Survival Insights. N.p., 07 Feb Web. 27 Nov Nakashima, Ellen. "Obama Signs Secret Directive to Help Thwart Cyberattacks." Washington Post. The Washington Post, 14 Nov Web. 02 Dec Roberts, Adam. "The Changing Faces of Terrorism." BBC News. BBC, 27 Aug Web. 02 Dec