Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Cyber Wars And Cyber Terrorism

Cyber wars and Cyber Terrorism -India ,and Pakistan by ganesh

  • Inicia sesión para ver los comentarios

Cyber Wars And Cyber Terrorism

  1. 1. Cyber wars & Cyber terrorism
  2. 2. Welcome <ul><li>cyber terrorism is the biggest threat for India today. </li></ul><ul><li>  &quot;The next big war that the country may have to wage against terror will be on the Internet. The network infrastructure of the country may be attacked any time. Social networking sites like Twitter, Facebook, Orkut and Myspace may also pose a threat”. </li></ul><ul><li>&quot;Pakistani cyber criminals deface nearly 60 Indian websites a day, but in return only 10 to 15 Pakistani websites are defaced. It has been going on since 2001. India may be the IT capital of the world, but as far as security issues are concerned the country is lagging far behind” -Ankit Fadia </li></ul>
  3. 3. Cyber Terrorism Defined <ul><li>The use of computing resources to intimidate, coerce or harm people, places or systems we depend upon </li></ul><ul><li>“ Hacking” with a body count </li></ul><ul><li>Section 66F </li></ul>
  4. 4. Terrorist Groups:
  5. 5. Unrelated events or strategic attack Power Outages World Trade Center Oklahoma City ATM Failures Airliner Crash Bridges Down ISPs All Offline Oil Refinery Fire 911 System Down Poisoned Water Supply Telephone Outages
  6. 6. Characteristics of Cyber Terrorism <ul><li>The act must have scale and publicity </li></ul><ul><li>Cyber terrorism is safe and profitable </li></ul><ul><li>Cyber terrorism is difficult to counter without the right expertise and understanding of the Cyber terrorist's mind. </li></ul><ul><li>Relatively anonymous </li></ul><ul><li>Unlike other acts of terrorism, if the Cyber terrorist loses today, he/she does not die – he/she learns what did not work, and will use that information against you tomorrow. </li></ul>
  7. 7. Cyber warriors <ul><li>The Cyber Terrorist will make certain that the population of a nation will not be able to eat, to drink, to move, or to live. </li></ul><ul><li>The people charged with the protection of their nation will not have warning, and will not be able to shut down the terrorist, since that Cyber Terrorist is relatively hard to locate and could be on the other side of the world or sitting at a personal computer in your public library. </li></ul>
  8. 8. Psychology of Modern Warfare and Hacking <ul><li>For Fun (31.4%) </li></ul><ul><li>Want to be best defacer (17.2%) </li></ul><ul><li>No reason Specified (14.7%) </li></ul><ul><li>Political Reasons (11.8%) </li></ul><ul><li>Patriotism (10.9%) </li></ul><ul><li>As a challenge (10.8%) </li></ul><ul><li>Revenge (3.3%) </li></ul>
  9. 9. Forms of Cyber Terrorism <ul><li>Privacy violation </li></ul><ul><li>Secret information appropriation and data theft </li></ul><ul><li>Demolition of e-governance base </li></ul><ul><li>Distributed denial of services attack </li></ul>“ THE NEXT GENERATIO OF TRANSNATIONAL CYBER TERRORISTS UNDERSTANDS THAT A HAND ON MOUSE CAN BE MORE LETHAL THAN A FINGER ON TRIGGER”
  10. 11. Factors Contributing to the Existence of Cyber Terrorism <ul><li>Dependence on Network Infrastructure and the Internet </li></ul><ul><li>Lack of Understanding of Security Risks </li></ul><ul><li>Lack of Funding for Adequate Network Security Tools </li></ul><ul><li>Perception that the steps to combat cyber terrorism will make life inconvenient </li></ul><ul><li>The ease and of doing the act </li></ul><ul><li>Difficulty in tracking the Cyber terrorist </li></ul>
  11. 12. Cyber Terrorism in Action <ul><li>Remotely accessing the processing control systems of a cereal manufacturer, changing the levels of iron supplement, and sicken and kill the children of a nation enjoying their food. That Cyber Terrorist will then perform similar remote alterations at a processor of infant formula. </li></ul><ul><li>Morningstar Inc.'s Canadian subsidiary is being forced to spend thousands of dollars on a security audit to reassure users about the safety of its investment-research Web site after a hacker claimed that he had broken into the unit's servers and accessed confidential customer information. </li></ul>
  12. 13. Cyber terrorism in Action <ul><li>Disruption of banks, international financial transactions, stock exchanges; forcing a nation's economic systems to grind to a halt due to massive denial of service attacks launched on the internet </li></ul><ul><li>Remotely changing the pressure in the gas lines, causing a valve failure, and a block of a sleepy suburb detonates and burns. Likewise, the electrical grid is becoming steadily more vulnerable. </li></ul>
  13. 14. Direct Cost Implications <ul><li>Loss of sales during the disruption </li></ul><ul><li>Staff time, network delays, intermittent access for business users </li></ul><ul><li>Increased insurance costs due to litigation </li></ul><ul><li>Loss of intellectual property - research, pricing, etc. </li></ul><ul><li>Costs of forensics for recovery and litigation </li></ul><ul><li>Loss of critical communications in time of emergency </li></ul>
  14. 15. Indirect Cost Implications <ul><li>Loss of confidence and credibility in our financial systems </li></ul><ul><li>Tarnished relationships& public image globally </li></ul><ul><li>Strained business partner relationships - domestic and internationally </li></ul><ul><li>Loss of future customer revenues for an individual or group of companies </li></ul><ul><li>Loss of trust in the government and computer industry </li></ul>
  15. 16. Who are the Cyberterrorists <ul><li>Crackers – the transition may be motivated by money or prestige. Usually, this transition will occur without the cracker's cognizance </li></ul><ul><li>Young, educated people brought into the folds of terrorist groups - this new generation will have the talent to execute the acts of Cyberterrorism </li></ul>
  16. 17. Main Weapon <ul><li>Building/Office Security </li></ul><ul><li>Desktop/Laptop Computer Security </li></ul><ul><li>Network Security </li></ul><ul><li>Disaster Recovery Planning </li></ul><ul><li>According to NASSCOM-IDC surveys the demand for ethical hackers is estimated at 7,000 in India and 188,000 worldwide currently. </li></ul>
  17. 18. What can we do? <ul><li>Cooperate and share intelligence among all agencies </li></ul><ul><li>Learn the new rules, the new technologies, and the new players </li></ul><ul><li>The tools of a counter-CyberTerrorist team must be real-time and dynamic, as the weapons will continually change </li></ul><ul><li>Make building, network and desktop security a priority </li></ul><ul><li>Report instances of cybercrime to local law enforcement agencies </li></ul>
  18. 19. Cyber History in India: <ul><li>First cyber attack: May 1998 </li></ul><ul><li>Reason: Pokhran 2 Nuclear Tests </li></ul><ul><li>Target: Bhabha Atomic Research Centre, India </li></ul><ul><li>Responsible Group: Milworm </li></ul><ul><li>Disclosure of sensitive mails regarding nuclear tests </li></ul><ul><li>Website Defaced </li></ul>
  19. 20. Indian Clips : <ul><li>Al-Qaeda Muslim </li></ul><ul><ul><li>Anti India Crew (AIC), powhack </li></ul></ul><ul><ul><ul><li>focuses on government networks </li></ul></ul></ul><ul><ul><li>G-Force </li></ul></ul><ul><ul><ul><li>targets websites with massive readerships </li></ul></ul></ul><ul><ul><li>Pakistan Hackerz Club (PHC) </li></ul></ul><ul><ul><ul><li>attacks the bigger names and networks, including those of large corporate houses . </li></ul></ul></ul><ul><ul><li>Kill India and Death to India </li></ul></ul><ul><ul><li>Indo-US Joint Task Force on cyber terrorism </li></ul></ul>
  20. 21. Major Targets of Pakistani Hackers <ul><li>Gujrat Government </li></ul><ul><li>Ministry of External Affairs </li></ul><ul><li>India Gandhi Centre for Atomic Research </li></ul><ul><li>India Online Bazaar </li></ul><ul><li>Indian National IT Promotion </li></ul><ul><li>India Today </li></ul><ul><li>Nuclear Science Centre </li></ul><ul><li>Telecommunication companies </li></ul>
  21. 22. Statistics of Indian Defacements <ul><li>Total number of defacements recorded – 780 </li></ul><ul><li> - 115 defacements - 14.74% </li></ul><ul><li> - 29 defacements - 3.72% </li></ul><ul><li> - 23 defacements - 2.95% </li></ul><ul><li> - 15 defacements - 1.92% </li></ul><ul><li> - 45 defacements - 5.77% </li></ul><ul><li> - 33 defacements - 4.23% </li></ul><ul><li> - 56 defacements - 7.18% </li></ul><ul><li> - 20 defacements - 2.56% </li></ul><ul><li>.com - 398 defacements - 51.03% </li></ul><ul><li>.net - 18 defacements - 2.31% </li></ul><ul><li>.org - 25 defacements - 3.21% </li></ul><ul><li>.edu - 2 defacements - 0.26% </li></ul>
  22. 23. Gujrat Government Website
  23. 24. India Gandhi Centre for Atomic Research
  24. 25. Top 5 Pakistani Attackers <ul><li>AIC - 166 defacements - 21.28% </li></ul><ul><li>GForce Pakistan - 116 defacements - 14.87% </li></ul><ul><li>Silver Lords - 101 defacements - 12.95% </li></ul><ul><li>WFD - 59 defacements - 7.56% </li></ul><ul><li>ISOTK - 17 defacements - 2.18% </li></ul>
  25. 26. Formation of Pakistani Hacker Groups and their Strategies <ul><li>GForce Pakistan </li></ul><ul><li>Silver Lords </li></ul><ul><li>Pakistan Hacker Club </li></ul>
  26. 27. Objectives of Pakistani Hackers <ul><li>Target websites with a huge domestic audience </li></ul><ul><li>To bring attention to violence in Kashmir </li></ul><ul><li>Middle East conflict </li></ul>
  27. 28. Indians in Action <ul><li>Paralyzed Pakistani government sites for more than two months in 2003. </li></ul><ul><li>Yaha-series viruses </li></ul><ul><li>Damaged about 150 Pakistani websites in two days and erasing files from the hard disks of more than 3,000 corporate computers. </li></ul><ul><li>Severe damage to Pakistan Internet Exchange and ecommerce </li></ul>
  28. 29. Indian Hackers <ul><li>Indian Snakes </li></ul><ul><ul><li>Roxx of Calcutta </li></ul></ul><ul><ul><li>Cobra </li></ul></ul><ul><li>Hindustan Hackers Association (H2O) </li></ul><ul><li>Andhrahackers </li></ul><ul><li>Indian Hackers Club </li></ul><ul><li>Indian Spy </li></ul>
  29. 30. Strategy of Indian Hackers <ul><li>Using Denial of Service Attacks as their primary weapon </li></ul>
  30. 31. What are International Agencies Role in Cyber Terrorism Defense: <ul><li>An organization called Interpol created in 1923, is a very significant force on the international level. With its headquarters in Lyon, France, Interpol has 178 member countries which makes it the second largest international organization only to United Nations. </li></ul><ul><li>Interpol serves as a link between law enforcement agencies of member countries. </li></ul><ul><li>It is known as the world’s police, and its mission statement is: To be the world’s pre-eminent police organization in support of all organizations, authorities, and services whose mission is preventing, detecting and suppressing crime. </li></ul>
  31. 32. International support : Joint Working Groups <ul><ul><li>India-U.S. joint working group works together to counter terrorism of all kinds. </li></ul></ul><ul><ul><li>These groups have aided in the increase of countries’ exchange of information, strengthen investigative cooperation, facilitate the signing of mutual legal assistance treaties, and accomplish several other significant anti-terrorist agreements. </li></ul></ul><ul><ul><li>These groups also introduced a bilateral cyber security forum, specially focusing on cyber terrorism issues and information security </li></ul></ul>
  32. 33. Conclusion <ul><li>The problem of cyber terrorism is multilateral having varied facets and dimensions. </li></ul><ul><li>Its solution requires rigorous application of energy and resources. </li></ul><ul><li>It must be noted that law is always seven steps behind the technology. </li></ul><ul><li>This is so because we have a tendency to make laws when the problem reaches at its zenith. </li></ul><ul><li>The enforcement of rights requires a “qualitative effort” and not a “quantitative effort”. Thus, till a law dealing expressly with cyber terrorism is enacted </li></ul>
  33. 34. Important Links on the Internet <ul><li>Iowa Homeland Security </li></ul><ul><ul><li> </li></ul></ul><ul><li>Federal Homeland Security </li></ul><ul><ul><li> </li></ul></ul><ul><li>Computer Information Advisory Capability </li></ul><ul><ul><li> </li></ul></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  34. 35. <ul><li>Thank You </li></ul>