SlideShare una empresa de Scribd logo
1 de 15
1
Cyber Threats
   At the end of this lesson, the student should be able
    to:

     Define cyberterrorism and cyberwarfare;

     Identify five types of cyber attacks and understand the
      damage that cyber attacks can inflict;

     Discuss several recent examples of cyber attacks;

     Identify and explain the roles of two organizations
      involved in defending US cyberspace.

                            Counterintelligence                 2
“The use of computer networks to shut down critical
   infrastructure (such as energy, transportation,
  government operations) or to coerce or intimidate
        a government or civilian population.”

   (Source: Center for Strategic and International Studies)




                           Cyber Threats                      3
   Information war

     “The use of computers and other devices to
       attack an enemy’s information systems as
      opposed to an enemy’s armies or factories.”

         (Source: American Heritage New Dictionary)




                          Cyber Threats               4
   Trojan Horse: A computer program that conceals
    harmful code. A Trojan horse usually masquerades as
    a useful program that a user would wish to execute.

   Virus: A program that infects computer files, usually
    executable programs, by inserting a copy of itself into
    the file. These copies are usually executed when the
    infected file is loaded into memory, allowing the virus
    to affect other files. Unlike a computer worm, a virus
    requires human involvement (usually unwitting) to
    propagate.
                           Cyber Threats                      5
   Phishing: Using emails and websites designed to look
    like those of legitimate businesses/government
    agencies to deceive internet users into disclosing
    personal data, e.g. bank and financial account
    information and passwords.
   DoS (Denial of Service): A method of attack from a
    single source that denise system access to legitimate
    users by overwhelming the target computer with
    messages and blocking legitimate traffic. It can
    prevent a system from being able to exchange data
    with other systems of use the internet.
                          Cyber Threats                     6
   Distributed Denial of Service (DDoS): A
    variant of the DoS attack that uses a
    coordinated attack from a distributed system
    of computers rather than from a single source.
    It often makes use of worms to spread to
    multiple computers that can then attack the
    target.


                      Counterintelligence            7
Titan Rain (2003+)
 Series of coordinated attacks on US
  computers
 Thought to be Chinese in origin
 NASA, Lockheed Martin, and other vital
  organizations penetrated



                  Counterintelligence      8
Estonia, April 2007
 DDoS attack against Estonian
  banks, media and government
 Coincided with major civil unrest
  by Russian nationals




                        Cyber Threats   9
GhostNet
 Chinese cyberespionage network
 At least 103 countries penetrated
 Searches computers and emails, then turns
  on webcams and microphones to record any
  conversations within range



                  Counterintelligence         10
Cyber Threats   11
   Created in 2006
   Housed within DHS
   “responsible for enhancing the security,
    resiliency, and reliability of the nation's cyber
    and communications infrastructure”




                       Counterintelligence              12
   Created in June 2009

   Began operations in May 2010

   Part of the US Strategic Command, involving
    military units from the US Army, Navy, Air
    Force and Marines

   Directed by General Keith B. Alexander (also
    head of NSA)
                     Cyber Threats                 13
Plans, coordinates, integrates,
synchronizes and conducts
activities to:

 Direct the operations and defense of
    specified DoD information networks

 Prepare to, and when directed,
    conduct full spectrum military
    cyberspace operations in order to
    enable actions in all domains, ensure
    US/Allied freedom of action in
    cyberspace and deny the same to our
    adversaries.


Counterintelligence                         14
   Spy Museum Interviews: http://spymuseum.org/from-
    spy/spycast
     November 1, 2009 interview features Melissa Hathaway,
      former senior director for cyberspace for the National
      Security Council
     June 15, 2009 interview features Dr. Terry Gudaitis, former
      CIA operations officer and president of cyber intelligence
      company Cyveillance

   www.DHS.gov/Cyber     } for more on securing
   www.OnGuardOnline.gov } shared cyber networks

                             Cyber Threats                          15

Más contenido relacionado

La actualidad más candente

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 

La actualidad más candente (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 

Destacado

Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014The eCore Group
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Project manager MBA cyber security
Project manager MBA cyber securityProject manager MBA cyber security
Project manager MBA cyber securityGarry Wood
 
World human population growth through history
World human population growth through historyWorld human population growth through history
World human population growth through historyBiswajit Das
 
Post-9/11 American Society
Post-9/11 American SocietyPost-9/11 American Society
Post-9/11 American Societyjdubrow2000
 
September 11th Impact on the World
September 11th Impact on the World September 11th Impact on the World
September 11th Impact on the World NIck Romano
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfareAmmad Ali
 
Customer perception @ bijjaragi motors mba project report
Customer perception @  bijjaragi motors mba project reportCustomer perception @  bijjaragi motors mba project report
Customer perception @ bijjaragi motors mba project reportBabasab Patil
 
Terrorism & its impat on international business
Terrorism & its impat on international businessTerrorism & its impat on international business
Terrorism & its impat on international businessAnkur Srivastava
 
Globalisation, Environment And Business
Globalisation, Environment And BusinessGlobalisation, Environment And Business
Globalisation, Environment And BusinessPeter Cullen
 
Effect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economyEffect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economyNitin Verma
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 

Destacado (20)

Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Project manager MBA cyber security
Project manager MBA cyber securityProject manager MBA cyber security
Project manager MBA cyber security
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
World human population growth through history
World human population growth through historyWorld human population growth through history
World human population growth through history
 
Post-9/11 American Society
Post-9/11 American SocietyPost-9/11 American Society
Post-9/11 American Society
 
September 11th Impact on the World
September 11th Impact on the World September 11th Impact on the World
September 11th Impact on the World
 
Pbl
PblPbl
Pbl
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Customer perception @ bijjaragi motors mba project report
Customer perception @  bijjaragi motors mba project reportCustomer perception @  bijjaragi motors mba project report
Customer perception @ bijjaragi motors mba project report
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Terrorism & its impat on international business
Terrorism & its impat on international businessTerrorism & its impat on international business
Terrorism & its impat on international business
 
Globalisation, Environment And Business
Globalisation, Environment And BusinessGlobalisation, Environment And Business
Globalisation, Environment And Business
 
Effect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economyEffect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economy
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

Similar a Cyber threats

cyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptxcyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptxmalik681299
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdfezzi552
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 

Similar a Cyber threats (20)

cyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptxcyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptx
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Exp r35
Exp r35Exp r35
Exp r35
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf
 
China Cyber
China CyberChina Cyber
China Cyber
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber War
Cyber WarCyber War
Cyber War
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 

Último

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Último (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Cyber threats

  • 2. At the end of this lesson, the student should be able to:  Define cyberterrorism and cyberwarfare;  Identify five types of cyber attacks and understand the damage that cyber attacks can inflict;  Discuss several recent examples of cyber attacks;  Identify and explain the roles of two organizations involved in defending US cyberspace. Counterintelligence 2
  • 3. “The use of computer networks to shut down critical infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Source: Center for Strategic and International Studies) Cyber Threats 3
  • 4. Information war “The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories.” (Source: American Heritage New Dictionary) Cyber Threats 4
  • 5. Trojan Horse: A computer program that conceals harmful code. A Trojan horse usually masquerades as a useful program that a user would wish to execute.  Virus: A program that infects computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to affect other files. Unlike a computer worm, a virus requires human involvement (usually unwitting) to propagate. Cyber Threats 5
  • 6. Phishing: Using emails and websites designed to look like those of legitimate businesses/government agencies to deceive internet users into disclosing personal data, e.g. bank and financial account information and passwords.  DoS (Denial of Service): A method of attack from a single source that denise system access to legitimate users by overwhelming the target computer with messages and blocking legitimate traffic. It can prevent a system from being able to exchange data with other systems of use the internet. Cyber Threats 6
  • 7. Distributed Denial of Service (DDoS): A variant of the DoS attack that uses a coordinated attack from a distributed system of computers rather than from a single source. It often makes use of worms to spread to multiple computers that can then attack the target. Counterintelligence 7
  • 8. Titan Rain (2003+)  Series of coordinated attacks on US computers  Thought to be Chinese in origin  NASA, Lockheed Martin, and other vital organizations penetrated Counterintelligence 8
  • 9. Estonia, April 2007  DDoS attack against Estonian banks, media and government  Coincided with major civil unrest by Russian nationals Cyber Threats 9
  • 10. GhostNet  Chinese cyberespionage network  At least 103 countries penetrated  Searches computers and emails, then turns on webcams and microphones to record any conversations within range Counterintelligence 10
  • 12. Created in 2006  Housed within DHS  “responsible for enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure” Counterintelligence 12
  • 13. Created in June 2009  Began operations in May 2010  Part of the US Strategic Command, involving military units from the US Army, Navy, Air Force and Marines  Directed by General Keith B. Alexander (also head of NSA) Cyber Threats 13
  • 14. Plans, coordinates, integrates, synchronizes and conducts activities to:  Direct the operations and defense of specified DoD information networks  Prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. Counterintelligence 14
  • 15. Spy Museum Interviews: http://spymuseum.org/from- spy/spycast  November 1, 2009 interview features Melissa Hathaway, former senior director for cyberspace for the National Security Council  June 15, 2009 interview features Dr. Terry Gudaitis, former CIA operations officer and president of cyber intelligence company Cyveillance  www.DHS.gov/Cyber } for more on securing  www.OnGuardOnline.gov } shared cyber networks Cyber Threats 15