SlideShare a Scribd company logo
1 of 16
INTRODUCTION ABOUT TOPICS
 What is Cyber Terrorism?
 Types Of Cyber Terrorism
 Effects To Cyber Terrorism For Our Environment
 Statistics on Cyber Terrorism
 Insider Statistics in World -Economic
 CYBER TERRORISM TOOK PLACE WORLD WIDE
 Example in cyber terrorism effects in world wide
 Cost & Means Of Attack
 Security Framework for Enterprise
 25 Attack History in World
 Conclusion
 Any Query????????
Presented by :-Sanjay Pariyar M.
1.What is Cyber Terrorism?
• A cyber-terrorist is a criminal who uses
computer technology and the Internet,
especially to cause fear and disruption.
Some cyber-terrorists spread
computer viruses, and others threaten
people electronically.
• Some ways they do this hacking
networks and computers to find out
personal information.
• The attacker distributes things that
draw huge amount of attention to get
information about people.
• Since computers are so powerful,
downloading software for cyber
terrorism is easy.
Types of Cyber Terrorism
I. Simple Unstructured
II. Advanced Structured
III. Complex Co-ordinated
This method doesn't do much because it can't carry
out as much information.
Example:- data remove etc.
This method has multiple systems and it has more
control, freedom and creativity towards the attack.
Example:-Banking Robbery,ATM Failure etc.
This method has intense hacking tools and is highly
capable of target analysis, command, control and
learning capability.Ex:-Airlines Crash,Building Crash,
power Outages, System Down, Telephone Outages etc.
Effects To Cyber Terrorism For Our Environment
• There are a double different affects of
cyber terrorism. One is financial
damage. Cyber terrorism doesn’t just
do damage to one person, but a mass
amount of people at one time.
• Since cyber terrorism effects the
economy so much, it can weak in ones
country making its defense system not
as strong to other terrorist attacks.
• Cyber terrorism can destroy a nation,
financially, and all its security. Also, it
can interrupt electrical systems and can
lead to potential death.
• Some people don't think its very
serious because they don't get nervous
but in reality it could ruin a nation and
kill a mass amount of people. The
affects are very serious and even
though a bomb isn't thrown or a plane
isn't flown through buildings it can still
be a very serious.
• Most people feel that military
stations, air traffic control centers,
banks and telecommunication
networks are the most common
targets but others are police, rescue
systems and etc.
• The graph below shows amateur
hackers. They are the most threat on
the Internet, they are responsible
for about 90% of all activity.
• Some times the govt. carries out an
attack to test its defense system.
They have found 88% of 3000
attacks. 96% of the entries weren't
detected but 4% were and 5% were
reported and investigated.
• In 1996, they found 40 major attacks
loosing over 800 million to
computer break ins.
• The FBI estimates that $138 million
is lost every year to hackers. Over
three years they have reported 40
threats but nothing serious.
• One time a Russian hacker, tapped
into Citibank's funds and took $10
million.
Statistics on Cyber Terrorism
INSIDER STATISTICS IN WORLD- ECONOMIC
Sabotage $ 871,000
System Penetration
Website Defacement
$ 901,500
$ 958,100
Misuse of public web Apps
Telecom Fraud
Abuse of wireless Network
Financial Fraud
Unauthorized Access
Laptop Theft
$ 2,747,000
$ 3,997,500
$ 4,278,205
$ 6,734,500
$ 7,670,500
$ 10,159,250
Insider Net Abuse $ 10,601,055
Theft of Proprietary info. $ 11,460,000
Denial of Service $ 26,064,050
Virus $ 55,053,900
Total Losses for 2004= Rs.141,496,560
0m 30m 40m 50m10m 20m 60m
Fourteen Crore Fourteen Lakh Ninety
Six Thousand Five hundred Sixty.
CYBER TERRORISM TOOK PLACE WORLD WIDE
• The breakage to the banking of the country. Flooding the whole city with
sewage waste.
• Cyber Crime has emerged as new level of terrorism world wide. which may even
happen in India.
Jamming the per of whole city. (i.e.) The blocking of power stations.
The Bombarding of the computers connected to internets.
• Robbery of the international banks. Breaking into the plane onboard computer
system forcing it to crash.
The complexity of the cyber terrorism is that this attacks can be carried out by
terrorists any where in world without even touching our soil with free of cost.
Example in cyber Terrorism Effects in World Wide
ATM Failure
Power Outages
Poisoned Water Supply
Bridge Down
World Trade Center
Airlines Crash
Oil Refinery Fire
Telephone Outages
911 System Down
Cost & Means Of Attacks
1945 1955 1960 1970 -1975 1985 Today
Invasi
on
Strategic
Nuclear
Weapon
s
Missiles
ICBM & SLBM
Cruise Missile
Precisi
on
Guided
Muniti
ons
Computer
Availability of Capability
Cost of
Capability
Security Officer
Project leader for all security Related Matter
Physical
Security
Access To
Building
Physical Assets
(Generic)
IT Hardware
(computer,PSDs,
Printers)
Vehicle Fleets
Operation
Manager +
Security Staffs
People
Security
Permanent
Staff
Contract Staff
Third Party
Employees
Partners
Visitor
Special Events
Security
HR
+
Security Staff
IT Manager +
Teams/HR/Fraud
Trades Secrets
Employee Data
Database
(Market
Intelligence)
Customer Data
(as Protected
Under DPD)
Data
Security
Networks
Remotes Sites
Remotes User
Application
Security
Websites
Intranet
Documentation
Work &
Procedures
Emergency
Response Plans
(ERPs)
Business
continuity Plans
(BC)
Disaster
Recovery Plans
(DR)
IT Manager
+
Teams
Operation
Manager
+
IT Teams/HR
IT
Security
Disaster Recovery
Business Cont.
BEST SECURITIES FRAMEWORK FOR ORGANIZATION
1. Flame 2. July 2009 cyber attacks 3.Candidate Government Hacking
4.PayPal 5.Project Chanology 6. 4Chan
7. India 8. Stuxnet 9.Opi Israel
10.Operation Aurora
13.HPS 14.Hannafd Bros
16. TJX
12.CityGroup11. Spamhaus Project
17.Sven Jaschan
15.Operation Shady Rat
18.Michael Calce
19. Presidential-Level
Espionage
24.Titan Rain23. Moonlight Maze22. Epsilon
21. The Estonian Cyber war20.Sony
25. The Original Logic Bomb
Conclusion
 Our National Security ,Databases and Economy
are extremely dependent upon Automation .
 Therefore ,There exist a ”Target Rich Environment”
for those who would harm via Internet. So first
priority is most Power High-tech Security in this
environment.
 Our Critical Infrastructure required joint
Private/Public Efforts to Protect Them.
ANY QUERY

More Related Content

What's hot

Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 

What's hot (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Viewers also liked

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
jessicafay2010
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
aliuet
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
Byerdavi
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
Yogendra Wagh
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
Niki Upadhyay
 

Viewers also liked (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Terrorism
TerrorismTerrorism
Terrorism
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 

Similar to Cyber terrorism

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abhay Vijay
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
Dharani Adusumalli
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 

Similar to Cyber terrorism (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 

Recently uploaded

Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
Terna SpA
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
Probe Gold
 

Recently uploaded (20)

Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024
 
Diligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage StartupsDiligence Checklist for Early Stage Startups
Diligence Checklist for Early Stage Startups
 
The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024Collective Mining | Corporate Presentation - May 2024
Collective Mining | Corporate Presentation - May 2024
 
Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024Osisko Development - Investor Presentation - May 2024
Osisko Development - Investor Presentation - May 2024
 
Nicola Mining Inc. Corporate Presentation May 2024
Nicola Mining Inc. Corporate Presentation May 2024Nicola Mining Inc. Corporate Presentation May 2024
Nicola Mining Inc. Corporate Presentation May 2024
 
Western Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 PresentationWestern Copper and Gold - May 2024 Presentation
Western Copper and Gold - May 2024 Presentation
 
countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024countries with the highest gold reserves in 2024
countries with the highest gold reserves in 2024
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
 
AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024AMG Quarterly Investor Presentation May 2024
AMG Quarterly Investor Presentation May 2024
 
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdfITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
ITAU EQUITY_STRATEGY_WARM_UP_20240505 DHG.pdf
 
Terna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results PresentationTerna - 1Q 2024 Consolidated Results Presentation
Terna - 1Q 2024 Consolidated Results Presentation
 
Teekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings ResultsTeekay Corporation Q1-24 Earnings Results
Teekay Corporation Q1-24 Earnings Results
 
Corporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdfCorporate Presentation Probe Canaccord Conference 2024.pdf
Corporate Presentation Probe Canaccord Conference 2024.pdf
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings Presentation
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024SME IPO Opportunity and Trends of May 2024
SME IPO Opportunity and Trends of May 2024
 
Osisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 ResultsOsisko Gold Royalties Ltd - Q1 2024 Results
Osisko Gold Royalties Ltd - Q1 2024 Results
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 

Cyber terrorism

  • 1. INTRODUCTION ABOUT TOPICS  What is Cyber Terrorism?  Types Of Cyber Terrorism  Effects To Cyber Terrorism For Our Environment  Statistics on Cyber Terrorism  Insider Statistics in World -Economic  CYBER TERRORISM TOOK PLACE WORLD WIDE  Example in cyber terrorism effects in world wide  Cost & Means Of Attack  Security Framework for Enterprise  25 Attack History in World  Conclusion  Any Query???????? Presented by :-Sanjay Pariyar M.
  • 2. 1.What is Cyber Terrorism? • A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber-terrorists spread computer viruses, and others threaten people electronically. • Some ways they do this hacking networks and computers to find out personal information. • The attacker distributes things that draw huge amount of attention to get information about people. • Since computers are so powerful, downloading software for cyber terrorism is easy.
  • 3. Types of Cyber Terrorism I. Simple Unstructured II. Advanced Structured III. Complex Co-ordinated This method doesn't do much because it can't carry out as much information. Example:- data remove etc. This method has multiple systems and it has more control, freedom and creativity towards the attack. Example:-Banking Robbery,ATM Failure etc. This method has intense hacking tools and is highly capable of target analysis, command, control and learning capability.Ex:-Airlines Crash,Building Crash, power Outages, System Down, Telephone Outages etc.
  • 4. Effects To Cyber Terrorism For Our Environment • There are a double different affects of cyber terrorism. One is financial damage. Cyber terrorism doesn’t just do damage to one person, but a mass amount of people at one time. • Since cyber terrorism effects the economy so much, it can weak in ones country making its defense system not as strong to other terrorist attacks. • Cyber terrorism can destroy a nation, financially, and all its security. Also, it can interrupt electrical systems and can lead to potential death. • Some people don't think its very serious because they don't get nervous but in reality it could ruin a nation and kill a mass amount of people. The affects are very serious and even though a bomb isn't thrown or a plane isn't flown through buildings it can still be a very serious.
  • 5. • Most people feel that military stations, air traffic control centers, banks and telecommunication networks are the most common targets but others are police, rescue systems and etc. • The graph below shows amateur hackers. They are the most threat on the Internet, they are responsible for about 90% of all activity. • Some times the govt. carries out an attack to test its defense system. They have found 88% of 3000 attacks. 96% of the entries weren't detected but 4% were and 5% were reported and investigated. • In 1996, they found 40 major attacks loosing over 800 million to computer break ins. • The FBI estimates that $138 million is lost every year to hackers. Over three years they have reported 40 threats but nothing serious. • One time a Russian hacker, tapped into Citibank's funds and took $10 million. Statistics on Cyber Terrorism
  • 6. INSIDER STATISTICS IN WORLD- ECONOMIC Sabotage $ 871,000 System Penetration Website Defacement $ 901,500 $ 958,100 Misuse of public web Apps Telecom Fraud Abuse of wireless Network Financial Fraud Unauthorized Access Laptop Theft $ 2,747,000 $ 3,997,500 $ 4,278,205 $ 6,734,500 $ 7,670,500 $ 10,159,250 Insider Net Abuse $ 10,601,055 Theft of Proprietary info. $ 11,460,000 Denial of Service $ 26,064,050 Virus $ 55,053,900 Total Losses for 2004= Rs.141,496,560 0m 30m 40m 50m10m 20m 60m Fourteen Crore Fourteen Lakh Ninety Six Thousand Five hundred Sixty.
  • 7. CYBER TERRORISM TOOK PLACE WORLD WIDE • The breakage to the banking of the country. Flooding the whole city with sewage waste. • Cyber Crime has emerged as new level of terrorism world wide. which may even happen in India. Jamming the per of whole city. (i.e.) The blocking of power stations. The Bombarding of the computers connected to internets. • Robbery of the international banks. Breaking into the plane onboard computer system forcing it to crash. The complexity of the cyber terrorism is that this attacks can be carried out by terrorists any where in world without even touching our soil with free of cost.
  • 8. Example in cyber Terrorism Effects in World Wide ATM Failure Power Outages Poisoned Water Supply Bridge Down World Trade Center Airlines Crash Oil Refinery Fire Telephone Outages 911 System Down
  • 9. Cost & Means Of Attacks 1945 1955 1960 1970 -1975 1985 Today Invasi on Strategic Nuclear Weapon s Missiles ICBM & SLBM Cruise Missile Precisi on Guided Muniti ons Computer Availability of Capability Cost of Capability
  • 10. Security Officer Project leader for all security Related Matter Physical Security Access To Building Physical Assets (Generic) IT Hardware (computer,PSDs, Printers) Vehicle Fleets Operation Manager + Security Staffs People Security Permanent Staff Contract Staff Third Party Employees Partners Visitor Special Events Security HR + Security Staff IT Manager + Teams/HR/Fraud Trades Secrets Employee Data Database (Market Intelligence) Customer Data (as Protected Under DPD) Data Security Networks Remotes Sites Remotes User Application Security Websites Intranet Documentation Work & Procedures Emergency Response Plans (ERPs) Business continuity Plans (BC) Disaster Recovery Plans (DR) IT Manager + Teams Operation Manager + IT Teams/HR IT Security Disaster Recovery Business Cont. BEST SECURITIES FRAMEWORK FOR ORGANIZATION
  • 11.
  • 12. 1. Flame 2. July 2009 cyber attacks 3.Candidate Government Hacking 4.PayPal 5.Project Chanology 6. 4Chan 7. India 8. Stuxnet 9.Opi Israel
  • 13. 10.Operation Aurora 13.HPS 14.Hannafd Bros 16. TJX 12.CityGroup11. Spamhaus Project 17.Sven Jaschan 15.Operation Shady Rat 18.Michael Calce
  • 14. 19. Presidential-Level Espionage 24.Titan Rain23. Moonlight Maze22. Epsilon 21. The Estonian Cyber war20.Sony 25. The Original Logic Bomb
  • 15. Conclusion  Our National Security ,Databases and Economy are extremely dependent upon Automation .  Therefore ,There exist a ”Target Rich Environment” for those who would harm via Internet. So first priority is most Power High-tech Security in this environment.  Our Critical Infrastructure required joint Private/Public Efforts to Protect Them.