SlideShare a Scribd company logo
1 of 28
“Tomorrow’s terrorist may be able to do
more damage with a keyboard than with
a bomb”
Content
Introduction
Cyber terrorism
Common attack
Examples
Black Out Day
Traditional terrorism
Affect In Future
Need to do
Prevention & Protection
Conclusion
INTRODUCTION
As the use of Internet is increasing day by day,
traditional concepts and methods of terrorism
have taken new dimensions.
 Individuals or groups can use the anonymity
afforded by cyberspace to threaten citizens,
specific groups (i.e. with membership based on
ethnicity or belief), communities and even the
countries.
What is Cyber terrorism???
Cyber terrorism is a phrase used to describe the
use of Internet based attacks in terrorist activities,
including acts of deliberate, large-scale disruption
of computer networks, especially of personal
computers attached to the Internet, by the means
of tools such as computer viruses.
Features of Cyber Terrorism
 Difficulty Identifying Attackers: It remains difficult to determine
the identity of the initiators of most cyber attacks.
 Lack of Boundaries: Attacks can originate from anywhere in the
world and from multiple locations simultaneously.
 Speed of Development: The time between the discovery of a new
vulnerability and the emergence of a new tool or technique that
exploits the vulnerability is getting shorter
 Low Cost of Tools: The technology employed in attacks is simple
to use, inexpensive, and widely available.
 Automated Methods: The methods of attack have become
automated and more sophisticated, resulting in greater damage from
a single attack.
Examples of Cyber terrorism..
Hacking into computer systems.
Introducing viruses to vulnerable networks.
Website Defacing.
Denial-of-Service(DoS) attacks.
Terroristic threats made via e-mail.
How does Cyber Terrorism work?
 Hacking : To gain access to (a computer file or network)
illegally or without authorization.
 Misinformation: To provide with incorrect information.
 Virus: A computer program that duplicates itself in a manner
that is harmful to normal computer use. Most viruses work by
attaching themselves to another program. The amount of
damage varies; viruses may erase all data or do nothing but
reproduce themselves.
 Worm: A malicious program that replicates itself until it fills all
of the storage space on a drive or network.
Who partakes in the act of cyber
terrorism?
Terrorists- Anyone who terrorizes by using
violence, threats, coercion, and/or intimidation
as a way to instill fear and gain submission.
3 most common attack methods
IP spoofing.
Password Cracking.
Denial-of-service attacks.
IP Spoofing
Refers to creation of IP packets with forged source
IP address with the purpose of concealing the
identity of sender.
Mostly used in Denial-of-Service attacks.
Most effective in corporate networks where users
can log in without a username or password.
Password Cracking
Password cracking can be implemented using
brute-force attacks, Trojan horse programs and IP
spoofing.
Password attacks usually refer to repeated
attempts to identify a user account and/or
password; these repeated attempts are called
brute-force attacks.
One example is weak encryption(LM hash) used
by Microsoft windows XP, can easily be attacked
Denial-of-Service attacks
Denial-of-service attacks focus on making a
service unavailable to intended users.
2 forms of DoS attacks: those that crash services
and those that flood services.
One common attack method involves
saturating the target machine with
communications requests such that it cannot
respond to the traffic.
Cost of
Capability
Availability of Capability
1955 1960 1970 1975 1985
Invasi
on
Precisi
on
Guided
ComputerStrategic
Nuclear
Weapons
Cruise Missile
Cost & Means of Attack
1945 Today
Missiles
ICBM & SLBM
Examples of Cyber terrorist attacks:
9/11 attack.
Ahmedabad bomb blast.
26/11 Mumbai attack.
9/11 Twin Towers Attack
Al-Qaeda laptop was found in
Afghanistan.
Hits on web sites that contained “Sabotage
Handbook”.
 Al-Qaeda actively researched publicly
available information concerning critical
infrastructures posted on web sites.
Ahmedabad Bomb Blast(26-07-08)
A mail with id alarbi_gujrat@ yahoo.com
was being sent by a group of Terrorists.
Person named Kenneth Haywood’s
unsecured WIFI router in his house was
being misused by terrorists.
3 more mails were sent after the
blast with the same misuse of
unsecured WIFI routers.
26/11 Mumbai Attack
Terrorists communicated with handlers
in Pakistan through Callphonex using
VoIP
(Voice over Internet Protocol).
The accused communicated to
terrorists with an email id
Kharak_telco@yahoo.com which was
accessed from 10 different IP addresses
Black Out Day
 It was first cyber war at “New York” city on 14th,August,2003
 Real incidents that horribly suffered New York for 3 days
 The hacker attacks on power lines
 Before 3 days some one some where realize the virus named as “
BLASTER”
 And it a self active
 100 power plants are shut down
 By the incident effects on whole traffic ,air line power ,water system &
nuclear reactor too
 New York government struggled 3 months to find the accused
 That was Russian government is totally responsibility to this act
CYBER TERRORISM IN INDIA
 ECIL(Electronic Corporation of India Limited) which was invented electro
voting system in India , controlling parliament security system , Nuclear
plants ,Defense etc.
 ECIL CYBER website was hacked by Phrozenmyst
 Not only ECIL and also ISRO ,BARC
 The hacker Phrozenmyst was stolen sensitive data from ECIL and pasted
on PAGEBIN website
 Due to they are making some illegal tenders and he tweet on his tweeter
account
 From 2010 to Pakistan and china attacking the India by cyber
 Recently Pakistan is made a successfully attack on India by an fake
currency at elections time
Cyber terrorism against traditional terrorism
In the future, cyber terrorism may become a feasible option
to traditional physical acts of violence due to:
a. Perceived anonymity.
b. Low risk of detection.
c. Low investment.
d. Operate from nearly any location.
e. Few resources are needed
How does Cyber Terrorism affect you
and your future?
Air traffic control towers or our airlines
infrastructure could be hacked into.
Banking systems could be violated and all of
our money could be stolen.
Bombs and other explosives could be set off by
remote.
Hospitals could lose all of their information.
Learn Government secrets and plans
The tampering of our water systems.
What do we need to do??
Maintain high alert & vigilance.
Update OS and applications regularly.
Enforce strong passwords.
“Lock down" systems.
Keep anti-virus software installed and up-to-
date.
Employ intrusion detection systems and firewalls.
Prevention & Protection:
Be cautious about opening email attachments.
Complete Software Updates
Create difficult passwords
Download anti-virus software
Uninstall unused applications or services
CONCLUSION:
 Cyber terrorism is a scary concept for many reasons.
 It can do possible serious damages to various aspects of our
lives. It is even scarier that cyber terrorism is so difficult to
catch and track and prosecute.
 The information age has brought us many good things, but
along with those good things came some bad things too.
 All we can do as citizens is to protect ourselves by protecting
our information, who we give it to and how much we give it
out.
 Our government is trying to do its part, so let’s support them
and their efforts and stop this cyber battle.
QUERIES PLEASE…
TEJESH
THANK
YOU

More Related Content

What's hot

Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 

What's hot (20)

Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Viewers also liked

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Viewers also liked (10)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to CYBER TERRORISM

1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptxAnkitShaw27
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismawderdlfy
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 

Similar to CYBER TERRORISM (20)

1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crime cyber crime
cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

CYBER TERRORISM

  • 1.
  • 2. “Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb”
  • 3. Content Introduction Cyber terrorism Common attack Examples Black Out Day Traditional terrorism Affect In Future Need to do Prevention & Protection Conclusion
  • 4. INTRODUCTION As the use of Internet is increasing day by day, traditional concepts and methods of terrorism have taken new dimensions.  Individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and even the countries.
  • 5. What is Cyber terrorism??? Cyber terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 6. Features of Cyber Terrorism  Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks.  Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously.  Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorter  Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available.  Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack.
  • 7. Examples of Cyber terrorism.. Hacking into computer systems. Introducing viruses to vulnerable networks. Website Defacing. Denial-of-Service(DoS) attacks. Terroristic threats made via e-mail.
  • 8. How does Cyber Terrorism work?  Hacking : To gain access to (a computer file or network) illegally or without authorization.  Misinformation: To provide with incorrect information.  Virus: A computer program that duplicates itself in a manner that is harmful to normal computer use. Most viruses work by attaching themselves to another program. The amount of damage varies; viruses may erase all data or do nothing but reproduce themselves.  Worm: A malicious program that replicates itself until it fills all of the storage space on a drive or network.
  • 9. Who partakes in the act of cyber terrorism? Terrorists- Anyone who terrorizes by using violence, threats, coercion, and/or intimidation as a way to instill fear and gain submission.
  • 10. 3 most common attack methods IP spoofing. Password Cracking. Denial-of-service attacks.
  • 11. IP Spoofing Refers to creation of IP packets with forged source IP address with the purpose of concealing the identity of sender. Mostly used in Denial-of-Service attacks. Most effective in corporate networks where users can log in without a username or password.
  • 12. Password Cracking Password cracking can be implemented using brute-force attacks, Trojan horse programs and IP spoofing. Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks. One example is weak encryption(LM hash) used by Microsoft windows XP, can easily be attacked
  • 13. Denial-of-Service attacks Denial-of-service attacks focus on making a service unavailable to intended users. 2 forms of DoS attacks: those that crash services and those that flood services. One common attack method involves saturating the target machine with communications requests such that it cannot respond to the traffic.
  • 14. Cost of Capability Availability of Capability 1955 1960 1970 1975 1985 Invasi on Precisi on Guided ComputerStrategic Nuclear Weapons Cruise Missile Cost & Means of Attack 1945 Today Missiles ICBM & SLBM
  • 15. Examples of Cyber terrorist attacks: 9/11 attack. Ahmedabad bomb blast. 26/11 Mumbai attack.
  • 16. 9/11 Twin Towers Attack Al-Qaeda laptop was found in Afghanistan. Hits on web sites that contained “Sabotage Handbook”.  Al-Qaeda actively researched publicly available information concerning critical infrastructures posted on web sites.
  • 17. Ahmedabad Bomb Blast(26-07-08) A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists. Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.
  • 18. 26/11 Mumbai Attack Terrorists communicated with handlers in Pakistan through Callphonex using VoIP (Voice over Internet Protocol). The accused communicated to terrorists with an email id Kharak_telco@yahoo.com which was accessed from 10 different IP addresses
  • 19. Black Out Day  It was first cyber war at “New York” city on 14th,August,2003  Real incidents that horribly suffered New York for 3 days  The hacker attacks on power lines  Before 3 days some one some where realize the virus named as “ BLASTER”  And it a self active  100 power plants are shut down  By the incident effects on whole traffic ,air line power ,water system & nuclear reactor too  New York government struggled 3 months to find the accused  That was Russian government is totally responsibility to this act
  • 20. CYBER TERRORISM IN INDIA  ECIL(Electronic Corporation of India Limited) which was invented electro voting system in India , controlling parliament security system , Nuclear plants ,Defense etc.  ECIL CYBER website was hacked by Phrozenmyst  Not only ECIL and also ISRO ,BARC  The hacker Phrozenmyst was stolen sensitive data from ECIL and pasted on PAGEBIN website  Due to they are making some illegal tenders and he tweet on his tweeter account  From 2010 to Pakistan and china attacking the India by cyber  Recently Pakistan is made a successfully attack on India by an fake currency at elections time
  • 21. Cyber terrorism against traditional terrorism In the future, cyber terrorism may become a feasible option to traditional physical acts of violence due to: a. Perceived anonymity. b. Low risk of detection. c. Low investment. d. Operate from nearly any location. e. Few resources are needed
  • 22. How does Cyber Terrorism affect you and your future? Air traffic control towers or our airlines infrastructure could be hacked into. Banking systems could be violated and all of our money could be stolen. Bombs and other explosives could be set off by remote. Hospitals could lose all of their information. Learn Government secrets and plans The tampering of our water systems.
  • 23. What do we need to do?? Maintain high alert & vigilance. Update OS and applications regularly. Enforce strong passwords. “Lock down" systems. Keep anti-virus software installed and up-to- date. Employ intrusion detection systems and firewalls.
  • 24. Prevention & Protection: Be cautious about opening email attachments. Complete Software Updates Create difficult passwords Download anti-virus software Uninstall unused applications or services
  • 25. CONCLUSION:  Cyber terrorism is a scary concept for many reasons.  It can do possible serious damages to various aspects of our lives. It is even scarier that cyber terrorism is so difficult to catch and track and prosecute.  The information age has brought us many good things, but along with those good things came some bad things too.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to and how much we give it out.  Our government is trying to do its part, so let’s support them and their efforts and stop this cyber battle.