1358619756 cyber terrorism
-
Upload
gayatri-aryasomayajula -
Category
Engineering
-
view
324 -
download
1
Transcript of 1358619756 cyber terrorism
![Page 1: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/1.jpg)
CYBERTERRORISM
PRESENTED BYNIDHI THAKUR -530 (AVEV II-CSE)A.G.G PRASANNA -502 (AVEV I I-CSE)
![Page 2: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/2.jpg)
INTRODUCTION• The use of Internet has
increased so much that even traditional concepts and methods of terrorism have a taken new dimension.
• Individuals or groups are using the anonymity cyberspace to threaten citizens, specific groups communities and even the countries.
![Page 3: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/3.jpg)
WHAT IS CYBERTERRORISM??• It is Internet based
attacks in terrorist activities
• It includes acts of large-scale disruption of computer networks
• Majorly personal computers attached to the Internet, by the means of tools such as computer viruses.
![Page 4: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/4.jpg)
EXAMPLES OF CYBERTERRORISM
Hacking into computer systems.
Introducing viruses to vulnerable networks.
Website Defacing. Denial-of-
Service(DOS) attacks.
Terroristic threats made via e-mail.
![Page 5: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/5.jpg)
3 MOST COMMON ATTACK METHODS
• IP spoofing• Password
Cracking • Denial-of-
service attacks
![Page 6: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/6.jpg)
IP SPOOFING
Creation of IP packets with forged source IP with the purpose of concealing the identity of sender
Used in Denial-of-Service attacks
Effective in corporate networks where users can log in without a username or password
![Page 7: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/7.jpg)
PASSWORD CRACKING• It usually referred to
repeated attempts to identify a user account or password and is called brute-force attacks
• It is implemented using brute-force attacks, Trojan horse programs and IP spoofing.
• Example is weak encryption used by Microsoft windows XP, can easily be attacked.
![Page 8: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/8.jpg)
DENIAL OF SERVICE ATTACKS• It focus on making a
service unavailable to intended users
• 2 forms of DoS attacks: a)crash services
b)flood services• One common attack
method involves saturating the target machine with communications requests such that it cannot respond to the traffic
![Page 9: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/9.jpg)
EXAMPLE OF CYBERTERRORISM ATTACKS
• 9/11 attack.• Ahmedabad bomb
blast.• 26/11 Mumbai
attack.
![Page 10: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/10.jpg)
9/11 TWIN TOWERS ATTACK
Al-Qaeda actively researchedpublicly available informationconcerning criticalinfrastructures posted on websites.
AHEMDABAD BOMB BLAST (26-07-08)
A mail with id alarbigujrat@ yahoo.com was being sent by a group of Terrorists.
Terrorists communicated with handlers in Pakistan through Call phonex using VoIP (Voice over Internet Protocol).
26/11 MUMBAI ATTACK
![Page 11: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/11.jpg)
Cyberterrorism against traditional terrorism
In the future, cyber
terrorism may become a feasible option to traditional physical acts of violence due to:
a. Perceived anonymity.b. Low risk of detection.c. Low investment.d. Operate from nearly
any location.e. Few resources are
needed.
![Page 12: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/12.jpg)
IMPACTS OF CYBERTERRORISM
• It has an immense impact on the world economy
• It possess the greatest threat to human lives, governments, organisations
• It has caused several deaths, market clashes, and has created deadliest scenario
![Page 13: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/13.jpg)
HOW TO PREVENT CYBERTERRORISM• Maintain high alert &
vigilance.• Update OS and
applications regularly.• Enforce strong
passwords.• “Lock down" systems.• Keep anti-virus
software installed and up-to-date.
• Employ intrusion detection systems and firewalls.
![Page 14: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/14.jpg)
“
CYBERTERRORISM
“Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb”
CONCLUSION
![Page 15: 1358619756 cyber terrorism](https://reader036.fdocuments.us/reader036/viewer/2022062412/58f0857e1a28ab16388b4635/html5/thumbnails/15.jpg)
THANK YOU
ANY QUERIES???