Cyber war

38
Department Of Computer Science and Technology Presented By B Praveen Kumar

Transcript of Cyber war

Slide 1

Department Of Computer Science and TechnologyPresented By B Praveen Kumar

CYBER WARWHAT IS A CYBERWAR ??????

HOW A HACKER CAN HACK ANY SITE ?????

HOW MANY COUNTRIES ARE SUFFERING UNDER THIS ATTACKS?????

WHAT ARE THE COUNTREIS SUFFERING UNDER THIS CYBER ATTACK ???

WHAT ARE THE TRICKS USED BY HACKER TO HACK ANY SITE ?????

HOW WE CAN OVER COME THIS PROBLEM (ANY SOLUTION) ???????

So lets see about it.

DEFINATION OF CYBERWAR Cyberwarfare is any virtual conflict initiatedas a politically motivated attack on an enemy's computer and information systems.Waged via the Internet, these attacks disable financial and organizational systems by stealing or altering classified data to undetermined networks, websites and services.

TYPES OF CYBER ATTACKSHACKINGCHILD PORNOGRAPHYDENIAL OF SERVICE ATTACKVIRUS DISSEMINITIONCOMPUTER VANDALISM CYBER TERRORISM SOFTWARE PIRACY

Hacking : Hacking in simple terms mean an illegal intrusion into a computer system or network. It is also known as CRACKING Government websites are the hot targets of the hackers The internet is being highly used by its abusers to reack and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles

DENIAL OF SERVICE ATTACK:This is an act by the criminal, who floods the bandwidthOf the victims network or fills his e-mail box with spamEmail depriving him of the services he is entitled to access

Malicious software that attaches itself to other software.(virus, worms, web hacking, e-mail bombing etc)

COMPUTER VANDALISMDamaging or destroying data rather than stealing or misusing them is called cyber vandalism.Transmitting virus: These are programs that attach themselves to file and then circulate

CYEBR TERRORISM: Terroism attacks on the internet by distributed denial of service attacks, fake websites and fake emails, attacks on sensitive computer networks. Technology hackers are using 512-bit encryption, which is impossible to decrypt.

SOFTWARE PIRACYTheft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Internet security is a branch of computer security specifically related to the internet.Its objective is to establish rules and measure to use against attacks over the internet.

How a hacker can hack any site ?????

what is the trick used by hacker to hack any email id, software etc.

TIPS USED BY A HACKER TO HACK

THIS IS HOW A HACKER THINKS AND IMPLAMENT THEIR PLAN

10-GARY MCKIMONInfiltrated 97 U.S military and NASA computers installing hacking software And deleting files 9-LULZSECGroup that has attacked sony news international .The CIA the FBI and scotland yard 8-ADRIAN LAMOHacked yahoo, microsoft, google ,and new york times7-MATHEW BEVAN AND RICHRAD PRYCEHacked us military computers and used them to infilitate foregin system .6-JANATHAN JAMEForced NASA to shut down its network after stealing software that controlled the Living envinorment on the international space station5-kevin poulsenRigged a radio station cann-in contest to win a porsche.4-kevin mitnickHacked the pentagon nokia and motorola.3-anonymousHackivist group that compaigns for internet freedom2-astra [ real identify classified]Greek mathematician who stole and sold weapons technology data. Jailed for causing Damage of over $360 millions1-albert seqvec gonzalezPart of TIX identity theft ring that stole 36 million credit card numbers. Th ecostof the hackis thorght ot exceed $400 millions Examples of cyberwarfare:

In 1998, the United States hacked into Serbia's air defense system to compromise air traffic control and facilitate the bombing of Serbian targets.

In 2007, in Estonia, a botnet (also known as a zombie army)of over a million computers brought down government, business and media websites across the country. The attack was suspected to have originated in Russia, motivated by political tension between the two countries. Also in 2007, an unknown foreign party hacked into high tech and military agencies in the United States and downloaded terabytes of information.

In 2009, a cyber spy network called "GhostNet" accessed confidential information belonging to both governmental and private organizations in over 100 countries around the world. GhostNet was reported to originate in China, although that country denied responsibility.

The Internet security company McAfee stated in their 2007 annual report that approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities Cyber warfare by country : On 7 April 2009, The Pentagon announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems. On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.

On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence CenterCyber incidence : On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry. On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks .

CHINA HIT BY BIGGEST EVER CYBER ATTACK China has said it has suffered its biggest ever cyber attack (on 27/Aug/2013) causing many websites based in the country to go temporarily offline .

DDOS (distributed denial of service) said that attack This attack have targeted server responsible for sites with a .cn domain name.

Country has not speculated on who may be responsible

China may have a vast population but it still has a developing landline and internet infrastructure,

Which has yet to reach 50 percent population

There are 382 attacks in the past 24 hours, the highest number of attacks per country on the map .

Other hotspots include eastern and Southern Europe ,as well as five U.S states, including New york, Delaware, Indiana ,Idaho, and California

CYBER ATTACK IN INDIACHENNAI: India is estimated to have lost at least 22 Gigabytes of data in the slew of cyber attacks it has seen of the targeted to various high-profile individuals and organizations.India is the only country in which 11 different types of organizations have been attacked including ministries and embassies, military and scientific institutes, aerospace research and IT companies and financial and media organizations.Some of the victims are still unknown

ATTACKS IN INDIA ARE DAY BY DAY INCREASED

Top 10 countries that commit the most cyber attacks

HUNGARY->RESPONSIBLE FOR 1.4%OF THE WORLDS CYBER ATTACKS

ITALY-> RESPONSIBLE FOR 1.6% OF THE WORLDS CYBER ATTACKS

INDIA->REPONSIBLE FOR 2.3% OF THE WORLDS CYBER ATTACKS

ROMANIA->RESPONSIBLE FOR 2.8% OF WORLDS CYBER ATTACKS

BRAZIL->RESPONSIBLE FOR 3.3% OF WORLDS CYBER ATTACKS

TAIWAN->RESPONSIBLE FOR 3.7% OF WORLDS CYBER ATTACKS

RUSSIA-> RESPONSIBLE FOR 4.3% OF WORLDS CYBER ATTACKS

USA-> RESPONSIBLE FOR 10% OF WORLDS CYBER ATTACKS

CHINA-> RESPONSIBLE FOR 41% OF WORLDS CYBER ATTACKS

TURKEY-> RESPONSIBLE FOR 4.7% OF WORLDS CYBER ATTACKS

IMPACK OF A CYBER WARThere are about 93 billion emails are sent per day that will not go through.

Millions of VoIP calls per day will not go through.

Over 200 million Google searches per day will not get done.

A reported 33% of Internet users say they make ecommerce transactions daily.

Contd..Some 88% of online user say the Internet plays a role in their daily routines.

Some 40% of Internet users who get the news online say they log on daily.

Some 25% of the online weather bugs will check weather daily.

Some 20% of online sports fans check sports scores daily.

IMPACK OF CYBER WARThe political fallout of a cyber attack will be high.

But this will pale in comparison to the financial and economic impact !

The financial and economic impact could be as high as $30 billion a day

Physical impact Social impactPolitical impact Financial impactBillions U.S. Retail e-commerce Sales

$425 million a day.

What if the Internet went away:For a dayA weekA month

No eMailsNo eCommerce

Virtual business services of all sorts, accounting, payroll and even sales would come to a halt, as would many companies. Modern Weapons EconomicsWhat does a stealth bomber cost?$1.5 to $2 billionWhat does a stealth fighter cost?$80 to $120 millionWhat does an cruise missile cost?$1 to $2 millionWhat does a cyber weapon cost?$300 to $50,000

Cyber Weapons EvolutionSome unknown facts1972 - TCP/IP invented 1983 -First virus created 1989 -World wide web created1998 -Google formed2007 -USAF cyber command is established 2007 -Large scale DDOS attacks hit Estonia2009-cyber security designated as key presidential priority In one incident $10 million was stolen from ATM machine in 24 hours of period 80% of banks fail to catch frauds

(www)

Conclusion : Our nation is increasingly vulnerable to cyber attacks that could have catastrophic effects on critical infrastructure as well as severely damage the countrys economy. Whether the attack is focused on stealing our business and technology secrets, disrupting our financial systems or worse, the threat is real. Countries, terrorists and extremists around the world are developing and implementing cyber warfare doctrine, strategies and weapons