The document defines cyber terrorism as politically motivated attacks against non-combatant computer systems and networks intended to disrupt services or destroy data. It discusses how terrorism has evolved to also impact people financially and emotionally through cyber means. The background section outlines growing public concern about potential cyber attacks in the late 1980s and examples of economic damage from Chinese hacker groups. The document contrasts cybercrime with cyber terrorism and explains motivations for cyber warfare include low costs, societal dependence on networks, and attacking across borders. Potential physical effects of cyber attacks are described like disrupting electric grids, water systems, air traffic control or emergency response networks. Challenges to cyber defense include numerous entry points, difficulty tracing attacks, lack of security in original
2. DEFINATION
• According to the U.S. Federal Bureau of Investigation, cyber
terrorism is any "premeditated, politically motivated attack
against information, computer systems, computer
programs, and data which results in violence against noncombatant targets by sub-national groups or agents.“
Political agenda
Use of computers and cyberspace to disrupt or destroy (may or may not lead to
deaths)
Civilians as targets
Publicity
Terrorism has evolved into an act that
is not only terrorism that can affect
us physically and mentally, but
financially and emotionally as well.
3. War with tanks and bombs is now old story, a
new era of terrorism with computers is started .
4. Background of Cyber Terrorism
• Public interest in cyber terrorism began in the late
1980s. As the year 2000 approached, the fear and
interest in potential cyber terrorist attacks also
increased. We all remember when the year 2000
was near and the craze that began over what
computers would and would not do. Even the
government was worried about national security
during this time.
• After a Chinese fighter collided with an American
surveillance plane in April, Chinese hacker groups
spent the next week or so cyber-attacking American
targets causing millions of dollars in damage.”
While some of these events may seem isolated, think
of what would happen if terrorists hacked into our
computers that controlled our transportation
system, including airplanes, subways, trains, and
even traffic lights. With that kind of control, they
could kill thousands of innocent Americans by only
keying in a code on their computer
5. WHAT IS THE DIFFERENCE BETWEEN CYBER
CRIME AND CYBER TERRORISM
• Cybercrime can involve theft of intellectual property, a violation of
patent, trade secret, or copyright laws. However, cybercrime also includes
attacks against computers to deliberately disrupt processing, or may include
espionage to make unauthorized copies of classified data.
• Cyber Terrorism can be defined in different ways. It can be unlawful
attacks and threats of attack against computers, networks and the
information stored there in when done to intimidate or coerce a
government ,this is treated as political agenda .
6. Why Use Cyber Warfare
• Low barriers to entry – laptops cost a lot less
than tanks
• Complex societies are dependent on computers
and networks
• Online Banking and money storage
• Companies stores data online
• Different Countries
8. Effects
- Harming effects on economy
- Damages to websites
- Effect on national security
- Cyber Terrorism ranges from simple hacking and computer viruses to causing of
terror war using computer
Pakistan sets death penalty for cyber terrorism
9. Physical effects by Cyber Terrorism
•
Electric Power System- The electrical power grid is a
probable target for cyber terrorists. If the computer
systems controlling these systems could be disrupted or
shut down it could knock out power for many. This could
lead to potential deaths if the system isn't recovered in a
timely manner.
•
Water Supply System- Water systems may be another
target for cyber terrorism. For example, if the flood gates
of a dam were targeted a lot of damage could be the
result, including the loss of lives. Also, the water supply
could be shut off leaving thousands without water
•
Air Traffic Systems- While aircrafts do not yet operate
solely on computer systems, attacking the air traffic
system could disrupt it causing thousands of delayed
flights.
•
911 Emergency Response System- Cyber terrorists could
overload the system therefore disabling it from actual
emergency calls.
10. Difficulties in Defense
• Many entry points to internet, most networks
• Difficult to trace attacks
– Many from robot networks (botnets) of compromised PCs
• Internet created for convenience, not security
– Internet technology does not support easy defense
• Unknown capabilities of other nations, groups
– So, little deterrence exists
• “Security is a process, not a product” – Bruce Schneier
• Defenders have to defend against many possible
attacks, but attackers only have to find one hole
11. • Go on the defensive now
– Educate senior management on risks of cyber warfare
– Make information security a top priority
– Enhance security technology