Top Banner
A SEMINAR PRESENTATION ON CYBER TERRORISM by: Rupam khatri B.Tech VIIIsem
27

cyber crime ppt

Nov 02, 2014

Download

Documents

ppt on cyber crime
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: cyber crime ppt

A SEMINAR PRESENTATION ON

CYBER TERRORISM

by: Rupam khatri

B.Tech VIIIsem

Page 2: cyber crime ppt

CYBERTERRORISM:Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us, it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.

Page 3: cyber crime ppt

Tools of Cyber terrorists: •Hacking Virus/Trojan horse/Worm •attacks Email Related Crimes•Denial of Service Attacks•Use of Cryptography and Steganography Legal provisions

Page 4: cyber crime ppt

WHAT’S THE DEFINITION EXACTLY

Cyberterrorism is the convergence of

terrorism and cyberspace.

It generally means :-

unlawful attacks.

threats of attack against computers,

networks, and the information

Page 5: cyber crime ppt

Cyber terrorist threats can include:• rapid communication of threats to a wide or specific audience• threats to public utilities and transportation threats to commercial institutions and transnational corporations• threats to IGOs and NGOs• threats to individuals• threats to political groups or other ethnic, religious or nationalist entities (all of these can include other terrorist groups) identified as "the enemy"• threats to security forces• threats to nation states

Page 6: cyber crime ppt

Further, to qualify as cyberterrorism, an attack should result in :-

Violence against persons or property.

At least cause enough harm to generate fear.

Attacks that lead to death or body injury,

explosions, plane crashes, water contamination,

or severe economic loss would be examples.

Serious attacks against critical

infrastructures could be acts of cyberterrorism,

depending on their impact.

Page 7: cyber crime ppt

Cyberterrorist threats can include :-

Public utilities and transportation.

IGOs and NGOs.

Individuals.

Political group or other ethnic, religious or nationalist entities.

Security forces.

Page 8: cyber crime ppt

SOME FACTORS LEADING TO CYBERTERRORIST :-

Targets that are vulnerable

to attack

Actors with the capability and motivation to

carry them

Misuse of the technology

Page 9: cyber crime ppt

Types Of Cyber Crimes: -Broadly three types of cyber crimes are

recognized: *Hacking without any intention to commit any further offence. *Unauthorized access with intention to commit further offences. These can include theft, fraud, miss-appropriations, forgery, cracking. *Distribution of digital information through use of virus, trogon horses, logic bombs.

Page 10: cyber crime ppt

Factors Leading To Cyberterrorism:•Whether there are targets that are vulnerable to attack that could lead to violence or severe harm.•Whether there are actors with the capability and motivation to carry them•Misuse of the technology that make it open to attack even after the high security•Involvement of the insiders, acting alone or in concert with the other terrorist misusing their access capabilities.•Role of consultants and contractor causing grave harm.

Page 11: cyber crime ppt

TIP’S TO PROTECT YOURSELF

Pick passwords

that are unusual and difficult to

guess.

Check for software

vendors to get security

upgrades and

patches.

If you are unsure

about the safety of the web-site or

receive suspicious

e-mail, don’t access it.

Page 12: cyber crime ppt

INSTANCES OF CYBERTERRORISM

In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period.

In 1999, NATO computers were blasted with e-mail bombs.

After the terrorist attack on Delhi High Court on September 7, 2011 Terrorists had hacked into unsecured wi-fi internet connections to send e-mails after the attack.

Mumbai serial blasts of July 13, 2011, before this attack IM activists sent out e-mails to various media organisations.

After the September 19, 2010, Jama Masjid (Delhi) attack, Delhi Police confirmed, a day later, that the IM had sent a threat e-mail from the IP address of a computer in Mumbai.

Page 13: cyber crime ppt

What can be done about Cyberterrorism?

Change the network configuration when defects become known.

Check with venders for upgrades and patches.

Accounts should have unusual passwords and difficult to guess.

If you are unsure about the safety of the web-site or receive suspicious e-mail, don’t access it.

Page 14: cyber crime ppt

FIVE WAYS TO STOP CYBER-TERRORISM

Page 15: cyber crime ppt

1.Use strong

passwords that

includes special

characters

Page 16: cyber crime ppt

Do not use unnecessary Application and Services

2.

Page 17: cyber crime ppt

Keep Software Up-to-Date

3.

Page 18: cyber crime ppt

Do Not Trust Mail Attachments All The Time

4.

Page 19: cyber crime ppt

Make Use of Anti-Virus Software

5.

Page 20: cyber crime ppt

Make Use of Anti-Virus Software

5.

Page 21: cyber crime ppt

Main activities:• Research• Publishing Information (recruitment)• Communication between members of terrorist groups• Terrorist financing and moneylaundering• Committing Cybercrime (politicalmotivated attacks)

Page 22: cyber crime ppt

ORGANISATION:• Decentralised structure of subversive organisations is supported by decentralised structure of the Internet• Lack of physical territory and infrastructure is compensated by network infrastructure (virtual territory)• Redundancy of the networks ensures the operability even if cells are uncovered• Flexibility of modern communication allows quick reconstruction of destroyed structures (Afghanistan)•International dimension of the Internet allow the terrorists to play aninternational role

Page 23: cyber crime ppt

ACTS UNDER CYBER TERRORISM:

•Amendments under the Information Technology Act, 2000 has defined the term “Cyberterrorism” .

• This is the first ever attempt in India to define the term.

• It reads as under:- Punishment for Cyberterrorism Whoever,—

•(A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by—

Page 24: cyber crime ppt

(i) denying or cause the denial of access to any person authorized to access computer resource; or

(ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorised access; or

(iii) introducing or causing to introduce any computer contaminant; and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under Section 70.

Page 25: cyber crime ppt

(B) knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access.• By means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations.•Accessing any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, In relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation.

Page 26: cyber crime ppt

What should be done???• Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.

•I.e. Imprisonment not exceeding fourteen years (Sec. 55, IPC) •This Section has defined conventional Cyber attacks like, unauthorised access, denial of service attack, etc, but motive and intention of the perpetrator differentiates the attack from an ordinary to an act of terrorism. •Illustration Rohit, a Hacker, gains unauthorised access into Railway traffic control grid (the grid has been declared as Critical Information Infrastructure U/Sec. 70) and thereby strikes terror amongst people, Rohit is said to have done an act of Cyberterrorism.

Page 27: cyber crime ppt

THANK YOU