CYBER TERRORISM PRESENTED BY NIDHI THAKUR -530 (AVEV II- CSE) A.G.G PRASANNA -502 (AVEV I I-CSE)
CYBERTERRORISM
PRESENTED BYNIDHI THAKUR -530 (AVEV II-CSE)A.G.G PRASANNA -502 (AVEV I I-CSE)
INTRODUCTION• The use of Internet has
increased so much that even traditional concepts and methods of terrorism have a taken new dimension.
• Individuals or groups are using the anonymity cyberspace to threaten citizens, specific groups communities and even the countries.
WHAT IS CYBERTERRORISM??• It is Internet based
attacks in terrorist activities
• It includes acts of large-scale disruption of computer networks
• Majorly personal computers attached to the Internet, by the means of tools such as computer viruses.
EXAMPLES OF CYBERTERRORISM
Hacking into computer systems.
Introducing viruses to vulnerable networks.
Website Defacing. Denial-of-
Service(DOS) attacks.
Terroristic threats made via e-mail.
3 MOST COMMON ATTACK METHODS
• IP spoofing• Password
Cracking • Denial-of-
service attacks
IP SPOOFING
Creation of IP packets with forged source IP with the purpose of concealing the identity of sender
Used in Denial-of-Service attacks
Effective in corporate networks where users can log in without a username or password
PASSWORD CRACKING• It usually referred to
repeated attempts to identify a user account or password and is called brute-force attacks
• It is implemented using brute-force attacks, Trojan horse programs and IP spoofing.
• Example is weak encryption used by Microsoft windows XP, can easily be attacked.
DENIAL OF SERVICE ATTACKS• It focus on making a
service unavailable to intended users
• 2 forms of DoS attacks: a)crash services
b)flood services• One common attack
method involves saturating the target machine with communications requests such that it cannot respond to the traffic
EXAMPLE OF CYBERTERRORISM ATTACKS
• 9/11 attack.• Ahmedabad bomb
blast.• 26/11 Mumbai
attack.
9/11 TWIN TOWERS ATTACK
Al-Qaeda actively researchedpublicly available informationconcerning criticalinfrastructures posted on websites.
AHEMDABAD BOMB BLAST (26-07-08)
A mail with id alarbigujrat@ yahoo.com was being sent by a group of Terrorists.
Terrorists communicated with handlers in Pakistan through Call phonex using VoIP (Voice over Internet Protocol).
26/11 MUMBAI ATTACK
Cyberterrorism against traditional terrorism
In the future, cyber
terrorism may become a feasible option to traditional physical acts of violence due to:
a. Perceived anonymity.b. Low risk of detection.c. Low investment.d. Operate from nearly
any location.e. Few resources are
needed.
IMPACTS OF CYBERTERRORISM
• It has an immense impact on the world economy
• It possess the greatest threat to human lives, governments, organisations
• It has caused several deaths, market clashes, and has created deadliest scenario
HOW TO PREVENT CYBERTERRORISM• Maintain high alert &
vigilance.• Update OS and
applications regularly.• Enforce strong
passwords.• “Lock down" systems.• Keep anti-virus
software installed and up-to-date.
• Employ intrusion detection systems and firewalls.
“
CYBERTERRORISM
“Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb”
CONCLUSION
THANK YOU
ANY QUERIES???