SlideShare una empresa de Scribd logo
1 de 19
Cyberterrorism

Eric Minaker
CSCI263
11/13/14
Example of a Cyberterrorism Attack
●

Stock market attacked from out of country

●

Devastating to economy

●

Causes chaos

●

Can cause political tension

●

Is damaging to the entire state

●

Great example of a cyberterrorism attack
What is Cyberterrorism?
●
●

●

●

Keiran Hardy
Must involve intent to conduct the act and
to influence people or government
Must include some political, religious, or
ideological motive or purpose
Can include the bringing about of harm
What is Cyberterrorism?
●

●

●

Difference between cyberterrorism and
hacking
Hacking may be done for monetary gain or
recognition
Hacking generally affects a small portion of
the population
What is Cyberterrorism?
●

●

●

Cyberterrorism has a larger purpose than
hacking
It focuses on attacks that can damage
countries and governments, not individuals
Cyberterrorists may kill citizens or
dignitaries
History of Cyberterrorism
●

Originates from cybernetic, from Greek for
“the one who governs” and terrorism, from
the Latin for “to inspire fear”

●

Not much of a history, relatively new field

●

Legal definition
History of Cyberterrorism
●

UN's Ad Hoc Committee on Measures to Eliminate
International Terrorism

●

UN International Crime and Justice Research Institute

●

NATO's Cooperative Cyber Defense Center for Excellence

●

G8 Communiques

●

The International Telecommunications Union

●

The International Center for Conuterterrorism

●

INTERPOL

●

EUROPOL
History of Cyberterrorism
●
●

●

●

EU Convention on Cybercrime
Most significant international treaty in this
area, still doesn't mention cyberterrorism
It does define national and international
cybercrimes
And lays out procedural law and production
order for investigation of cybercrime
History of Cyberterrorism
●

●

No previous attacks defined as
cyberterrorism
Have been alleged cyberterrorism attacks
–

Titan Rain

–

Estonia attacks

–

Stuxnet
What Can Be Attacked?
●

Almost everything

●

Pacemakers

●

Other embedded medical devices

●

Vehicles

●

Smart home systems

●

Mobile devices
What Can Be Attacked?
●

Nuclear facilities and other infrastructure

●

Stuxnet

●

Devastating attacks, cutting off utilities and
damaging the economy

●

Can funnel money back to terrorist groups

●

International Space Station

●

Attacked multiple times
What Methods Are Being Used?
●

Worms
–

–

Code capable of copying itself and corrupting or
destroying system data

–
●

Stuxnet

–

●

Malware program that replicates itself in order to
spread to other computers

Common in botnets, used to infect many computers

Viruses

Trojan Horse
–

Program that breaches security while performing an
otherwise innocuous function

–

Could infect civilian or government systems
How Can We Defend?
●

Classic Counter-terrorism
–
–

●

Physical eliminating the threat
Tracking and investigating cybercrimes to
find further evidence

International Collaborations in Countering
Cyberterrorism
–

National police forces and legal systems
struggle

–

Conflicting interest of member-states
How Can We Defend?
●

Current Policies

●

Tallinn Manual (2013)
–

Initiated by NATO's Cyber Defense
Centre for Excellence

–

Identifies 95 black letter rules that
represent restatements of the law applied
in cyber context
How Can We Defend?
●

Current Policies

●

2012 Chicago Summit Declaration
–

Helped bring all NATO bodies under
centralized cyber protection

–

Created a rapid reaction team to assist
member states
How Can We Defend?
●

Current Policies

●

2011 Cyber Defense Policy
–

Confirms that cyber intrusions at the
member-state level must be handled
politically, not militarily
Careers in Cyberterrorism
●

United States
–
–

●

Annual growth of 15%

–

●

Currently 91,080 cybersecurity experts

Estimated to have 25,000,000 cybersecurity
experts currently

–

Pushing to have 500,000 cybersecurity experts
in the next five years

–

Currently has 556 experts

China

India
Conclusion
●
●

●

●

Cyberterrorism is more than just hacking
There have not been any official incidents
of cyberterrorism
As we develop new devices, they get
compromised
Any counter-cyberterrorism effort will have
to be a multi-national effort
Sources
●

A Multidisciplinary Conference on Cyberterrorism: Final Report
–

●

●

Networks and Netwars: The Future of Terror, Crime, and Militancy by John
Arquilla and David Ronfeldt
Cyberterrorism: How Real is the Threat?
–

●

●

http://dspace.cigilibrary.org/jspui/bitstream/123456789/15033/1/Cyberterrorism%20How%20Real%20Is%20the%20Threat.pdf?1

Cybersecurity & Algo Trading Most Happening Careers in the Field of
Management and IT
EU Conventions of Cybercrime
–

●

http://www.cyberterrorism-project.org/wp-content/uploads/2013/07/CTP-Conference-Report.pdf

http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm

Understanding Cyberterrorism
–

http://search.proquest.com/docview/1173888997?accountid=27857

Más contenido relacionado

La actualidad más candente

The FBI's War On Terror
The FBI's War On TerrorThe FBI's War On Terror
The FBI's War On TerrorOrion White
 
Migration and securitisation mir507
Migration and securitisation mir507Migration and securitisation mir507
Migration and securitisation mir507Tapiwa Nherera
 
Manual SC Topico_A
Manual SC Topico_AManual SC Topico_A
Manual SC Topico_APREFEMUN
 
White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17difordham
 
Sec4 express chapter1(managing peace and security)_transnational_terrorism
Sec4 express chapter1(managing  peace and security)_transnational_terrorismSec4 express chapter1(managing  peace and security)_transnational_terrorism
Sec4 express chapter1(managing peace and security)_transnational_terrorismAdrian Peeris
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscapeJynette Reed
 
Small State Security Engagement
Small State Security EngagementSmall State Security Engagement
Small State Security EngagementMatthew Hedges
 
Un security council protocols in papua new guinea
Un security council protocols in papua new guineaUn security council protocols in papua new guinea
Un security council protocols in papua new guineaBILU KASANDA
 
Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdictionmariaidga
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 

La actualidad más candente (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
The FBI's War On Terror
The FBI's War On TerrorThe FBI's War On Terror
The FBI's War On Terror
 
Migration and securitisation mir507
Migration and securitisation mir507Migration and securitisation mir507
Migration and securitisation mir507
 
Manual SC Topico_A
Manual SC Topico_AManual SC Topico_A
Manual SC Topico_A
 
White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17
 
Sec4 express chapter1(managing peace and security)_transnational_terrorism
Sec4 express chapter1(managing  peace and security)_transnational_terrorismSec4 express chapter1(managing  peace and security)_transnational_terrorism
Sec4 express chapter1(managing peace and security)_transnational_terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscape
 
Small State Security Engagement
Small State Security EngagementSmall State Security Engagement
Small State Security Engagement
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Un security council protocols in papua new guinea
Un security council protocols in papua new guineaUn security council protocols in papua new guinea
Un security council protocols in papua new guinea
 
Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdiction
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 

Destacado

Lim JUS 394 Cyberterrorism
Lim JUS 394 CyberterrorismLim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorismmerlyna
 
Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)Muhammad Yahaya
 
Sign Language in Communication
Sign Language in CommunicationSign Language in Communication
Sign Language in CommunicationMeera Hapaliya
 
American sign language powerpoint
American sign language powerpointAmerican sign language powerpoint
American sign language powerpointMichael Bergenheim
 
Power Point Soccer
Power Point SoccerPower Point Soccer
Power Point Soccermcongro
 
Researching genre
Researching genreResearching genre
Researching genreleiajc
 
Presentation1 visual bee - visualbee
Presentation1   visual bee - visualbeePresentation1   visual bee - visualbee
Presentation1 visual bee - visualbeeBenjaminSSmith
 
Give/Get Union Suisse Christmas 2013
Give/Get Union Suisse Christmas 2013Give/Get Union Suisse Christmas 2013
Give/Get Union Suisse Christmas 2013Catalyx
 
Presentazione standard1
Presentazione standard1Presentazione standard1
Presentazione standard1angelo1970
 
Analysis of recruitment and selection process
Analysis of recruitment and selection processAnalysis of recruitment and selection process
Analysis of recruitment and selection processNeethu yadav
 
ครอบครัวของฉัน
ครอบครัวของฉันครอบครัวของฉัน
ครอบครัวของฉันChanti Choolkonghor
 
That Hallowed Spot! Chattanooga's Confederate Cemetery
That Hallowed Spot! Chattanooga's Confederate CemeteryThat Hallowed Spot! Chattanooga's Confederate Cemetery
That Hallowed Spot! Chattanooga's Confederate CemeteryGordon Belt
 
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...Andrés Felipe Hernández Chocontá
 
NDC London 2013 - Mongo db for c# developers
NDC London 2013 - Mongo db for c# developersNDC London 2013 - Mongo db for c# developers
NDC London 2013 - Mongo db for c# developersSimon Elliston Ball
 

Destacado (20)

Lim JUS 394 Cyberterrorism
Lim JUS 394 CyberterrorismLim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)
 
Food chemistry
Food chemistryFood chemistry
Food chemistry
 
Sign Language in Communication
Sign Language in CommunicationSign Language in Communication
Sign Language in Communication
 
Deaf culture
Deaf cultureDeaf culture
Deaf culture
 
Sign Language
Sign LanguageSign Language
Sign Language
 
American sign language powerpoint
American sign language powerpointAmerican sign language powerpoint
American sign language powerpoint
 
Power Point Soccer
Power Point SoccerPower Point Soccer
Power Point Soccer
 
Researching genre
Researching genreResearching genre
Researching genre
 
Presentation1 visual bee - visualbee
Presentation1   visual bee - visualbeePresentation1   visual bee - visualbee
Presentation1 visual bee - visualbee
 
Give/Get Union Suisse Christmas 2013
Give/Get Union Suisse Christmas 2013Give/Get Union Suisse Christmas 2013
Give/Get Union Suisse Christmas 2013
 
Evaluation 3
Evaluation 3Evaluation 3
Evaluation 3
 
Presentazione standard1
Presentazione standard1Presentazione standard1
Presentazione standard1
 
Analysis of recruitment and selection process
Analysis of recruitment and selection processAnalysis of recruitment and selection process
Analysis of recruitment and selection process
 
Surrealism
SurrealismSurrealism
Surrealism
 
ครอบครัวของฉัน
ครอบครัวของฉันครอบครัวของฉัน
ครอบครัวของฉัน
 
That Hallowed Spot! Chattanooga's Confederate Cemetery
That Hallowed Spot! Chattanooga's Confederate CemeteryThat Hallowed Spot! Chattanooga's Confederate Cemetery
That Hallowed Spot! Chattanooga's Confederate Cemetery
 
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
 
NDC London 2013 - Mongo db for c# developers
NDC London 2013 - Mongo db for c# developersNDC London 2013 - Mongo db for c# developers
NDC London 2013 - Mongo db for c# developers
 

Similar a 263presentation

CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 
Terrorisim and Role of Security organizations
Terrorisim and Role of Security organizationsTerrorisim and Role of Security organizations
Terrorisim and Role of Security organizationsDoç. Dr.Samih Teymur
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...adnis1
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
2.7 overview-on-intelligence-Steele on future
2.7 overview-on-intelligence-Steele on future2.7 overview-on-intelligence-Steele on future
2.7 overview-on-intelligence-Steele on futureRobert David Steele Vivas
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 

Similar a 263presentation (20)

Chapter14
Chapter14Chapter14
Chapter14
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Terrorisim and Role of Security organizations
Terrorisim and Role of Security organizationsTerrorisim and Role of Security organizations
Terrorisim and Role of Security organizations
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
2.7 overview-on-intelligence-Steele on future
2.7 overview-on-intelligence-Steele on future2.7 overview-on-intelligence-Steele on future
2.7 overview-on-intelligence-Steele on future
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cyber2
Cyber2Cyber2
Cyber2
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 

Último

*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...anjanibaddipudi1
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Delhi Call girls
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...Faga1939
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Delhi Call girls
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...IT Industry
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...srinuseo15
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...hyt3577
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsVoterMood
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfssuser5750e1
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeRahatulAshafeen
 

Último (20)

*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 

263presentation

  • 2. Example of a Cyberterrorism Attack ● Stock market attacked from out of country ● Devastating to economy ● Causes chaos ● Can cause political tension ● Is damaging to the entire state ● Great example of a cyberterrorism attack
  • 3. What is Cyberterrorism? ● ● ● ● Keiran Hardy Must involve intent to conduct the act and to influence people or government Must include some political, religious, or ideological motive or purpose Can include the bringing about of harm
  • 4. What is Cyberterrorism? ● ● ● Difference between cyberterrorism and hacking Hacking may be done for monetary gain or recognition Hacking generally affects a small portion of the population
  • 5. What is Cyberterrorism? ● ● ● Cyberterrorism has a larger purpose than hacking It focuses on attacks that can damage countries and governments, not individuals Cyberterrorists may kill citizens or dignitaries
  • 6. History of Cyberterrorism ● Originates from cybernetic, from Greek for “the one who governs” and terrorism, from the Latin for “to inspire fear” ● Not much of a history, relatively new field ● Legal definition
  • 7. History of Cyberterrorism ● UN's Ad Hoc Committee on Measures to Eliminate International Terrorism ● UN International Crime and Justice Research Institute ● NATO's Cooperative Cyber Defense Center for Excellence ● G8 Communiques ● The International Telecommunications Union ● The International Center for Conuterterrorism ● INTERPOL ● EUROPOL
  • 8. History of Cyberterrorism ● ● ● ● EU Convention on Cybercrime Most significant international treaty in this area, still doesn't mention cyberterrorism It does define national and international cybercrimes And lays out procedural law and production order for investigation of cybercrime
  • 9. History of Cyberterrorism ● ● No previous attacks defined as cyberterrorism Have been alleged cyberterrorism attacks – Titan Rain – Estonia attacks – Stuxnet
  • 10. What Can Be Attacked? ● Almost everything ● Pacemakers ● Other embedded medical devices ● Vehicles ● Smart home systems ● Mobile devices
  • 11. What Can Be Attacked? ● Nuclear facilities and other infrastructure ● Stuxnet ● Devastating attacks, cutting off utilities and damaging the economy ● Can funnel money back to terrorist groups ● International Space Station ● Attacked multiple times
  • 12. What Methods Are Being Used? ● Worms – – Code capable of copying itself and corrupting or destroying system data – ● Stuxnet – ● Malware program that replicates itself in order to spread to other computers Common in botnets, used to infect many computers Viruses Trojan Horse – Program that breaches security while performing an otherwise innocuous function – Could infect civilian or government systems
  • 13. How Can We Defend? ● Classic Counter-terrorism – – ● Physical eliminating the threat Tracking and investigating cybercrimes to find further evidence International Collaborations in Countering Cyberterrorism – National police forces and legal systems struggle – Conflicting interest of member-states
  • 14. How Can We Defend? ● Current Policies ● Tallinn Manual (2013) – Initiated by NATO's Cyber Defense Centre for Excellence – Identifies 95 black letter rules that represent restatements of the law applied in cyber context
  • 15. How Can We Defend? ● Current Policies ● 2012 Chicago Summit Declaration – Helped bring all NATO bodies under centralized cyber protection – Created a rapid reaction team to assist member states
  • 16. How Can We Defend? ● Current Policies ● 2011 Cyber Defense Policy – Confirms that cyber intrusions at the member-state level must be handled politically, not militarily
  • 17. Careers in Cyberterrorism ● United States – – ● Annual growth of 15% – ● Currently 91,080 cybersecurity experts Estimated to have 25,000,000 cybersecurity experts currently – Pushing to have 500,000 cybersecurity experts in the next five years – Currently has 556 experts China India
  • 18. Conclusion ● ● ● ● Cyberterrorism is more than just hacking There have not been any official incidents of cyberterrorism As we develop new devices, they get compromised Any counter-cyberterrorism effort will have to be a multi-national effort
  • 19. Sources ● A Multidisciplinary Conference on Cyberterrorism: Final Report – ● ● Networks and Netwars: The Future of Terror, Crime, and Militancy by John Arquilla and David Ronfeldt Cyberterrorism: How Real is the Threat? – ● ● http://dspace.cigilibrary.org/jspui/bitstream/123456789/15033/1/Cyberterrorism%20How%20Real%20Is%20the%20Threat.pdf?1 Cybersecurity & Algo Trading Most Happening Careers in the Field of Management and IT EU Conventions of Cybercrime – ● http://www.cyberterrorism-project.org/wp-content/uploads/2013/07/CTP-Conference-Report.pdf http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm Understanding Cyberterrorism – http://search.proquest.com/docview/1173888997?accountid=27857