SlideShare a Scribd company logo
1 of 11
CYBER TERRORISM
DEFINATION
• According to the U.S. Federal Bureau of Investigation, cyber
terrorism is any "premeditated, politically motivated attack
against information, computer systems, computer
programs, and data which results in violence against noncombatant targets by sub-national groups or agents.“
 Political agenda
 Use of computers and cyberspace to disrupt or destroy (may or may not lead to
deaths)
 Civilians as targets
 Publicity

Terrorism has evolved into an act that
is not only terrorism that can affect
us physically and mentally, but
financially and emotionally as well.
War with tanks and bombs is now old story, a
new era of terrorism with computers is started .
Background of Cyber Terrorism
• Public interest in cyber terrorism began in the late
1980s. As the year 2000 approached, the fear and
interest in potential cyber terrorist attacks also
increased. We all remember when the year 2000
was near and the craze that began over what
computers would and would not do. Even the
government was worried about national security
during this time.
• After a Chinese fighter collided with an American
surveillance plane in April, Chinese hacker groups
spent the next week or so cyber-attacking American
targets causing millions of dollars in damage.”
While some of these events may seem isolated, think
of what would happen if terrorists hacked into our
computers that controlled our transportation
system, including airplanes, subways, trains, and
even traffic lights. With that kind of control, they
could kill thousands of innocent Americans by only
keying in a code on their computer
WHAT IS THE DIFFERENCE BETWEEN CYBER
CRIME AND CYBER TERRORISM
• Cybercrime can involve theft of intellectual property, a violation of
patent, trade secret, or copyright laws. However, cybercrime also includes
attacks against computers to deliberately disrupt processing, or may include
espionage to make unauthorized copies of classified data.
• Cyber Terrorism can be defined in different ways. It can be unlawful
attacks and threats of attack against computers, networks and the
information stored there in when done to intimidate or coerce a
government ,this is treated as political agenda .
Why Use Cyber Warfare
• Low barriers to entry – laptops cost a lot less
than tanks
• Complex societies are dependent on computers
and networks
• Online Banking and money storage
• Companies stores data online
• Different Countries
HOW
Effects
- Harming effects on economy
- Damages to websites
- Effect on national security
- Cyber Terrorism ranges from simple hacking and computer viruses to causing of
terror war using computer

Pakistan sets death penalty for cyber terrorism
Physical effects by Cyber Terrorism
•

Electric Power System- The electrical power grid is a
probable target for cyber terrorists. If the computer
systems controlling these systems could be disrupted or
shut down it could knock out power for many. This could
lead to potential deaths if the system isn't recovered in a
timely manner.

•

Water Supply System- Water systems may be another
target for cyber terrorism. For example, if the flood gates
of a dam were targeted a lot of damage could be the
result, including the loss of lives. Also, the water supply
could be shut off leaving thousands without water

•

Air Traffic Systems- While aircrafts do not yet operate
solely on computer systems, attacking the air traffic
system could disrupt it causing thousands of delayed
flights.

•

911 Emergency Response System- Cyber terrorists could
overload the system therefore disabling it from actual
emergency calls.
Difficulties in Defense
• Many entry points to internet, most networks
• Difficult to trace attacks
– Many from robot networks (botnets) of compromised PCs

• Internet created for convenience, not security
– Internet technology does not support easy defense

• Unknown capabilities of other nations, groups
– So, little deterrence exists

• “Security is a process, not a product” – Bruce Schneier
• Defenders have to defend against many possible
attacks, but attackers only have to find one hole
• Go on the defensive now
– Educate senior management on risks of cyber warfare
– Make information security a top priority
– Enhance security technology

More Related Content

What's hot (20)

Hackers
HackersHackers
Hackers
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
E-Government
E-GovernmentE-Government
E-Government
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Information security
Information securityInformation security
Information security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Botnets
BotnetsBotnets
Botnets
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 

Similar to Cyber terrorism

Similar to Cyber terrorism (20)

Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Brooks18
Brooks18Brooks18
Brooks18
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Cyber terrorism

  • 2. DEFINATION • According to the U.S. Federal Bureau of Investigation, cyber terrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by sub-national groups or agents.“  Political agenda  Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths)  Civilians as targets  Publicity Terrorism has evolved into an act that is not only terrorism that can affect us physically and mentally, but financially and emotionally as well.
  • 3. War with tanks and bombs is now old story, a new era of terrorism with computers is started .
  • 4. Background of Cyber Terrorism • Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and interest in potential cyber terrorist attacks also increased. We all remember when the year 2000 was near and the craze that began over what computers would and would not do. Even the government was worried about national security during this time. • After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights. With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer
  • 5. WHAT IS THE DIFFERENCE BETWEEN CYBER CRIME AND CYBER TERRORISM • Cybercrime can involve theft of intellectual property, a violation of patent, trade secret, or copyright laws. However, cybercrime also includes attacks against computers to deliberately disrupt processing, or may include espionage to make unauthorized copies of classified data. • Cyber Terrorism can be defined in different ways. It can be unlawful attacks and threats of attack against computers, networks and the information stored there in when done to intimidate or coerce a government ,this is treated as political agenda .
  • 6. Why Use Cyber Warfare • Low barriers to entry – laptops cost a lot less than tanks • Complex societies are dependent on computers and networks • Online Banking and money storage • Companies stores data online • Different Countries
  • 7. HOW
  • 8. Effects - Harming effects on economy - Damages to websites - Effect on national security - Cyber Terrorism ranges from simple hacking and computer viruses to causing of terror war using computer Pakistan sets death penalty for cyber terrorism
  • 9. Physical effects by Cyber Terrorism • Electric Power System- The electrical power grid is a probable target for cyber terrorists. If the computer systems controlling these systems could be disrupted or shut down it could knock out power for many. This could lead to potential deaths if the system isn't recovered in a timely manner. • Water Supply System- Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water • Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights. • 911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.
  • 10. Difficulties in Defense • Many entry points to internet, most networks • Difficult to trace attacks – Many from robot networks (botnets) of compromised PCs • Internet created for convenience, not security – Internet technology does not support easy defense • Unknown capabilities of other nations, groups – So, little deterrence exists • “Security is a process, not a product” – Bruce Schneier • Defenders have to defend against many possible attacks, but attackers only have to find one hole
  • 11. • Go on the defensive now – Educate senior management on risks of cyber warfare – Make information security a top priority – Enhance security technology