This document discusses the topic of cyber terrorism, including:
- Defining cyber terrorism as using computer technology and the internet to cause fear and disruption.
- Describing three types of cyber terrorism: simple unstructured attacks, advanced structured attacks, and complex coordinated attacks.
- Explaining some of the effects of cyber terrorism, such as financial damage, weakening a nation's security and economy, and potentially causing death by disrupting critical systems.
- Providing some statistics on cyber attacks and losses due to various types of attacks.
- Listing some examples of cyber attacks that have taken place worldwide, targeting things like banking systems, air traffic control, and power grids.
1. INTRODUCTION ABOUT TOPICS
ď§ What is Cyber Terrorism?
ď§ Types Of Cyber Terrorism
ď§ Effects To Cyber Terrorism For Our Environment
ď§ Statistics on Cyber Terrorism
ď§ Insider Statistics in World -Economic
ď§ CYBER TERRORISM TOOK PLACE WORLD WIDE
ď§ Example in cyber terrorism effects in world wide
ď§ Cost & Means Of Attack
ď§ Security Framework for Enterprise
ď§ 25 Attack History in World
ď§ Conclusion
ď§ Any Query????????
Presented by :-Sanjay Pariyar M.
2. 1.What is Cyber Terrorism?
⢠A cyber-terrorist is a criminal who uses
computer technology and the Internet,
especially to cause fear and disruption.
Some cyber-terrorists spread
computer viruses, and others threaten
people electronically.
⢠Some ways they do this hacking
networks and computers to find out
personal information.
⢠The attacker distributes things that
draw huge amount of attention to get
information about people.
⢠Since computers are so powerful,
downloading software for cyber
terrorism is easy.
3. Types of Cyber Terrorism
I. Simple Unstructured
II. Advanced Structured
III. Complex Co-ordinated
This method doesn't do much because it can't carry
out as much information.
Example:- data remove etc.
This method has multiple systems and it has more
control, freedom and creativity towards the attack.
Example:-Banking Robbery,ATM Failure etc.
This method has intense hacking tools and is highly
capable of target analysis, command, control and
learning capability.Ex:-Airlines Crash,Building Crash,
power Outages, System Down, Telephone Outages etc.
4. Effects To Cyber Terrorism For Our Environment
⢠There are a double different affects of
cyber terrorism. One is financial
damage. Cyber terrorism doesnât just
do damage to one person, but a mass
amount of people at one time.
⢠Since cyber terrorism effects the
economy so much, it can weak in ones
country making its defense system not
as strong to other terrorist attacks.
⢠Cyber terrorism can destroy a nation,
financially, and all its security. Also, it
can interrupt electrical systems and can
lead to potential death.
⢠Some people don't think its very
serious because they don't get nervous
but in reality it could ruin a nation and
kill a mass amount of people. The
affects are very serious and even
though a bomb isn't thrown or a plane
isn't flown through buildings it can still
be a very serious.
5. ⢠Most people feel that military
stations, air traffic control centers,
banks and telecommunication
networks are the most common
targets but others are police, rescue
systems and etc.
⢠The graph below shows amateur
hackers. They are the most threat on
the Internet, they are responsible
for about 90% of all activity.
⢠Some times the govt. carries out an
attack to test its defense system.
They have found 88% of 3000
attacks. 96% of the entries weren't
detected but 4% were and 5% were
reported and investigated.
⢠In 1996, they found 40 major attacks
loosing over 800 million to
computer break ins.
⢠The FBI estimates that $138 million
is lost every year to hackers. Over
three years they have reported 40
threats but nothing serious.
⢠One time a Russian hacker, tapped
into Citibank's funds and took $10
million.
Statistics on Cyber Terrorism
6. INSIDER STATISTICS IN WORLD- ECONOMIC
Sabotage $ 871,000
System Penetration
Website Defacement
$ 901,500
$ 958,100
Misuse of public web Apps
Telecom Fraud
Abuse of wireless Network
Financial Fraud
Unauthorized Access
Laptop Theft
$ 2,747,000
$ 3,997,500
$ 4,278,205
$ 6,734,500
$ 7,670,500
$ 10,159,250
Insider Net Abuse $ 10,601,055
Theft of Proprietary info. $ 11,460,000
Denial of Service $ 26,064,050
Virus $ 55,053,900
Total Losses for 2004= Rs.141,496,560
0m 30m 40m 50m10m 20m 60m
Fourteen Crore Fourteen Lakh Ninety
Six Thousand Five hundred Sixty.
7. CYBER TERRORISM TOOK PLACE WORLD WIDE
⢠The breakage to the banking of the country. Flooding the whole city with
sewage waste.
⢠Cyber Crime has emerged as new level of terrorism world wide. which may even
happen in India.
Jamming the per of whole city. (i.e.) The blocking of power stations.
The Bombarding of the computers connected to internets.
⢠Robbery of the international banks. Breaking into the plane onboard computer
system forcing it to crash.
The complexity of the cyber terrorism is that this attacks can be carried out by
terrorists any where in world without even touching our soil with free of cost.
8. Example in cyber Terrorism Effects in World Wide
ATM Failure
Power Outages
Poisoned Water Supply
Bridge Down
World Trade Center
Airlines Crash
Oil Refinery Fire
Telephone Outages
911 System Down
9. Cost & Means Of Attacks
1945 1955 1960 1970 -1975 1985 Today
Invasi
on
Strategic
Nuclear
Weapon
s
Missiles
ICBM & SLBM
Cruise Missile
Precisi
on
Guided
Muniti
ons
Computer
Availability of Capability
Cost of
Capability
10. Security Officer
Project leader for all security Related Matter
Physical
Security
Access To
Building
Physical Assets
(Generic)
IT Hardware
(computer,PSDs,
Printers)
Vehicle Fleets
Operation
Manager +
Security Staffs
People
Security
Permanent
Staff
Contract Staff
Third Party
Employees
Partners
Visitor
Special Events
Security
HR
+
Security Staff
IT Manager +
Teams/HR/Fraud
Trades Secrets
Employee Data
Database
(Market
Intelligence)
Customer Data
(as Protected
Under DPD)
Data
Security
Networks
Remotes Sites
Remotes User
Application
Security
Websites
Intranet
Documentation
Work &
Procedures
Emergency
Response Plans
(ERPs)
Business
continuity Plans
(BC)
Disaster
Recovery Plans
(DR)
IT Manager
+
Teams
Operation
Manager
+
IT Teams/HR
IT
Security
Disaster Recovery
Business Cont.
BEST SECURITIES FRAMEWORK FOR ORGANIZATION
11.
12. 1. Flame 2. July 2009 cyber attacks 3.Candidate Government Hacking
4.PayPal 5.Project Chanology 6. 4Chan
7. India 8. Stuxnet 9.Opi Israel
15. Conclusion
ďś Our National Security ,Databases and Economy
are extremely dependent upon Automation .
ďś Therefore ,There exist a âTarget Rich Environmentâ
for those who would harm via Internet. So first
priority is most Power High-tech Security in this
environment.
ďś Our Critical Infrastructure required joint
Private/Public Efforts to Protect Them.