SlideShare una empresa de Scribd logo
1 de 14
Cyber-Terrorism
What is cyber-terrorism?
• "The premeditated, politically motivated attack
against information, computer systems, computer
programs, and data which result in violence against
noncombatant targets by sub-national groups or
clandestine agents". -FBI
• "The use of computer network tools to shut down
critical national infrastructure (such as energy,
transportation, government operations) or to
coerce or intimidate a government or civilian
population". -Center for Strategic/Int’l Studies
Types
• Logic Bombs
• Phishing
• Sniffer
• Trojan Horse
• Virus
• War Driving
• Worm
• Zero-Day Exploit
The cyber threat
• As our nations critical infrastructure becomes more
reliant on computer networks in order to operate,
there is an increased concern that these are
desired targets.
Examples
Electric Power System
Water Supply System
Air Traffic Control Systems
Healthcare Systems
Why cyber threats?
• Cyber terrorist prefer using the cyber attack
methods because of many advantages for it.
It is Cheaper than traditional methods.
• The action is very Difficult to be tracked.
• There are no physical barriers or check points to
cross.
• They can hide their personalities and location.
• They can use this method to attack a big number of
targets.
• They can do it remotely from anywhere in the world.
• They can affect a large number of people.
Cyber-terrorism Examples
• Started about mid1990s around the time of the internet
boom.
• 1997: Web site set up for Zapatistas, a Mexican rebel
group, to lead attacks against U.S. military from 1,500
locations in 50 different countries.
• 1999: NATO computers are blasted with e-mail bombs
and hit with denial-of-service attacks by hacktivists
protesting the bombings in Kosovo.
• 2000: Assassins hack into a hospital computer to change
the medication of a patient so that he would be given a
lethal injection. He was dead within a few hours.
Phishing
• Phishing is a way of attempting to acquire
information such as usernames, passwords,
and credit card details by masquerading as
a trustworthy entity in an electronic
communication. Communications
purporting to be from popular social web
sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public.
• Back
War driving
• War driving is the act of
searching for Wi-Fi wireless
networks by a person in a
moving vehicle, using a
portable computer,
smartphone or personal digital
assistant (PDA).
• Back
zero-day
• A zero-day (or zero-hour or day zero) attack
or threat is a computer threat that tries to
exploit computer application vulnerabilities
that are unknown to others or the software
developer. Zero-day exploits (actual
software that uses a security hole to carry
out an attack) are used or shared by
attackers before the developer of the target
software knows about the vulnerability.
• Back
Sniffer
• Sniffer may refer to:
• Packet analyzer (aka network analyzer, protocol
analyzer or sniffer), computer software or hardware that
can intercept and log traffic passing over a digital
network
• Allan Clarke (footballer), the Leeds Utd and England
striker known by that nickname
• a program that tracks a person straight to their IP and
computer
• equipment used in a car's tailpipe during an emissions
test
• equipment used as leak detector in vacuum technic
• Back
logic bomb
• A logic bomb is a piece of code
intentionally inserted into a software
system that will set off a malicious
function when specified conditions are
met. For example, a programmer may
hide a piece of code that starts
deleting files (such as a salary
database trigger), should they ever be
terminated from the company.
• Back
Trojan
• A Trojan may give a hacker
remote access to a targeted
computer system. Once a Trojan
has been installed on a targeted
computer system, hackers may be
given remote access to the
computer allowing them to
perform all kinds of operations
• Back
worm
• A computer worm is a standalone malware
computer program that replicates itself in order
to spread to other computers. Often, it uses a
computer network to spread itself. This is due to
security shortcomings on the target computer.
Unlike a computer virus, it does not need to
attach itself to an existing program. Worms
almost always cause at least some harm to the
network, even if only by consuming bandwidth,
whereas viruses almost always corrupt or modify
files on a targeted computer.
• Back
computer virus
• A computer virus is a computer program
that can replicate itself[1] and spread
from one computer to another. The term
"virus" is also commonly, but erroneously
used, to refer to other types of malware,
including but not limited to adware and
spyware programs that do not have a
reproductive ability
• Back

Más contenido relacionado

La actualidad más candente

Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 

La actualidad más candente (20)

Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 

Destacado

Catalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOMECatalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOMEWIKILAND
 
E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007Le Nin Real
 
"Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?""Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?"Stephen Leadholm
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 

Destacado (9)

Catalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOMECatalogue Opal Riverside Quận Thủ Đức || HOME2HOME
Catalogue Opal Riverside Quận Thủ Đức || HOME2HOME
 
E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007E catalogue the gold view - Lê Nin 0908906007
E catalogue the gold view - Lê Nin 0908906007
 
"Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?""Social Ties and Terrorism: Do They Matter?"
"Social Ties and Terrorism: Do They Matter?"
 
C01.8 terrorism
C01.8 terrorismC01.8 terrorism
C01.8 terrorism
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Terrorism
TerrorismTerrorism
Terrorism
 
Social media and terrorism
Social media and terrorismSocial media and terrorism
Social media and terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 

Similar a Cyber terrorism

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...Matthew J McMahon
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxSriArun9
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 

Similar a Cyber terrorism (20)

Brooks18
Brooks18Brooks18
Brooks18
 
Internet and personal privacy
Internet and personal privacyInternet and personal privacy
Internet and personal privacy
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptxComputer Scienc-WPS Office.pptx
Computer Scienc-WPS Office.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Más de Hiren Selani

Unit 3 3 architectural design
Unit 3 3 architectural designUnit 3 3 architectural design
Unit 3 3 architectural designHiren Selani
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge managementHiren Selani
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsHiren Selani
 
Application in manufacturing sector
Application in manufacturing sectorApplication in manufacturing sector
Application in manufacturing sectorHiren Selani
 
Application In service sector
Application In service sectorApplication In service sector
Application In service sectorHiren Selani
 
Development process of mis
Development process of misDevelopment process of mis
Development process of misHiren Selani
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISHiren Selani
 
Information,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceInformation,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceHiren Selani
 

Más de Hiren Selani (14)

Digitalbusiness
DigitalbusinessDigitalbusiness
Digitalbusiness
 
Introduction
IntroductionIntroduction
Introduction
 
Unit 3 3 architectural design
Unit 3 3 architectural designUnit 3 3 architectural design
Unit 3 3 architectural design
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Process models
Process modelsProcess models
Process models
 
Dss & knowledge management
Dss & knowledge managementDss & knowledge management
Dss & knowledge management
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Application in manufacturing sector
Application in manufacturing sectorApplication in manufacturing sector
Application in manufacturing sector
 
Application In service sector
Application In service sectorApplication In service sector
Application In service sector
 
Development process of mis
Development process of misDevelopment process of mis
Development process of mis
 
DEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MISDEVELOPMENT PROCESS OF MIS
DEVELOPMENT PROCESS OF MIS
 
System
SystemSystem
System
 
Information,Knowledge,Business intelligence
Information,Knowledge,Business intelligenceInformation,Knowledge,Business intelligence
Information,Knowledge,Business intelligence
 
Decision making
Decision makingDecision making
Decision making
 

Último

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Último (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Cyber terrorism

  • 2. What is cyber-terrorism? • "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents". -FBI • "The use of computer network tools to shut down critical national infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population". -Center for Strategic/Int’l Studies
  • 3. Types • Logic Bombs • Phishing • Sniffer • Trojan Horse • Virus • War Driving • Worm • Zero-Day Exploit
  • 4. The cyber threat • As our nations critical infrastructure becomes more reliant on computer networks in order to operate, there is an increased concern that these are desired targets. Examples Electric Power System Water Supply System Air Traffic Control Systems Healthcare Systems
  • 5. Why cyber threats? • Cyber terrorist prefer using the cyber attack methods because of many advantages for it. It is Cheaper than traditional methods. • The action is very Difficult to be tracked. • There are no physical barriers or check points to cross. • They can hide their personalities and location. • They can use this method to attack a big number of targets. • They can do it remotely from anywhere in the world. • They can affect a large number of people.
  • 6. Cyber-terrorism Examples • Started about mid1990s around the time of the internet boom. • 1997: Web site set up for Zapatistas, a Mexican rebel group, to lead attacks against U.S. military from 1,500 locations in 50 different countries. • 1999: NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo. • 2000: Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours.
  • 7. Phishing • Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. • Back
  • 8. War driving • War driving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA). • Back
  • 9. zero-day • A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or the software developer. Zero-day exploits (actual software that uses a security hole to carry out an attack) are used or shared by attackers before the developer of the target software knows about the vulnerability. • Back
  • 10. Sniffer • Sniffer may refer to: • Packet analyzer (aka network analyzer, protocol analyzer or sniffer), computer software or hardware that can intercept and log traffic passing over a digital network • Allan Clarke (footballer), the Leeds Utd and England striker known by that nickname • a program that tracks a person straight to their IP and computer • equipment used in a car's tailpipe during an emissions test • equipment used as leak detector in vacuum technic • Back
  • 11. logic bomb • A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company. • Back
  • 12. Trojan • A Trojan may give a hacker remote access to a targeted computer system. Once a Trojan has been installed on a targeted computer system, hackers may be given remote access to the computer allowing them to perform all kinds of operations • Back
  • 13. worm • A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. • Back
  • 14. computer virus • A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term "virus" is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability • Back