Top Banner
NANDHA ENGINEERING NANDHA ENGINEERING COLLEGE COLLEGE ERODE-52 ERODE-52
20

Cyber War

Nov 17, 2014

Download

Education

indhuj

we did it very well... got gud comments,,,,,,, especially no queries.:-)
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber War

NANDHA ENGINEERING NANDHA ENGINEERING COLLEGECOLLEGE

ERODE-52ERODE-52

Page 2: Cyber War

CYBER WAR-A NEW CYBER WAR-A NEW FACE OF TERRORISMFACE OF TERRORISM

Guided byGuided byE.Kanimozhi ,M.EE.Kanimozhi ,M.EAP/Dept of ITAP/Dept of IT

PRESENTED BYPRESENTED BYS.INDHUJAS.INDHUJA

G.KEERTHANA PREETHIG.KEERTHANA PREETHI

Page 3: Cyber War

Objective:Objective:RevengeRevengePoliticsPoliticsProtest Protest Disrupt the activities of an enemy Disrupt the activities of an enemy countrycountry

Page 4: Cyber War

CYBER WARCYBER WAR

The use of computers to disrupt the The use of computers to disrupt the activities of an enemy country, especially the activities of an enemy country, especially the deliberate attacking of communication deliberate attacking of communication systems.systems.

Page 5: Cyber War
Page 6: Cyber War

Cyberterrorism Definition1. Political agenda

2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths)

3. Civilians as targets

4. Publicity

5. Non-state actors

Traditional Terrorism definition:

• Use of violence

Page 7: Cyber War

Cyber TerrorismCyber Terrorism

Cyber terrorism is the use of Cyber terrorism is the use of Internet based attacks in  based attacks in terrorist activities,  activities, including acts of deliberate, large-scale including acts of deliberate, large-scale disruption of computer networks, especially disruption of computer networks, especially of personal computers attached to the of personal computers attached to the Internet, by the means of tools such Internet, by the means of tools such as computer viruses.as computer viruses.

Page 8: Cyber War

Cyber terrorism can be also defined as the intentional use of computer networks, and public internet to cause destruction and harm for personal objectives . Objectives may be political or ideological since this is a form of terrorism.

Page 9: Cyber War

Attack TargetsAttack Targets

Cell phone worms.Cell phone worms.Rootkits.Rootkits.Trojans.Trojans.Spreading virus via trojans.Spreading virus via trojans.

Page 10: Cyber War

Distributed denial-of-service attack (DDoS)Distributed denial-of-service attack (DDoS)

A distributed denial-of-service (DDoS) attack A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems is one in which a multitude of compromised systems attack a single target, thereby causingattack a single target, thereby causing  denial of denial of serviceservice for users of the targeted system.  for users of the targeted system.

The flood of incoming messages to the target The flood of incoming messages to the target system essentially forces it to shut down.system essentially forces it to shut down.

Types:Types:

Network centric attack (bandwidth)Network centric attack (bandwidth)Application layer attack(app., calls)Application layer attack(app., calls)

Page 11: Cyber War

Cyberspace:Cyberspace:

The term The term cyberspacecyberspace has become a conventional means to describe  has become a conventional means to describe anything associated with the Internet and the diverse Internet culture.anything associated with the Internet and the diverse Internet culture.

Amongst individuals on cyberspace, there is believed to be a code Amongst individuals on cyberspace, there is believed to be a code of shared rules and ethics mutually beneficial for all to follow, referred to of shared rules and ethics mutually beneficial for all to follow, referred to as cyberethics.as cyberethics.

Page 12: Cyber War

Threats in Cyberspace

1. Hacktivism

2. Cybercrime

3. Cyber terrorism

Page 13: Cyber War

Levels of Cyber Levels of Cyber Terrorism:Terrorism:

Simple Un-StructuredSimple Un-StructuredAdvanced –StructuredAdvanced –StructuredComplex coordinatedComplex coordinated

Page 14: Cyber War

The Nature of the Internet:Strength and Weaknesses

• Redundancy

• Wireless

• Vulnerabilities and flaws can be corrected

• Flaws

• Reliance on private sector

Page 15: Cyber War

Cyber securityCyber security

Complex security risks and challenges.Complex security risks and challenges.

Limiting the risk to data before attacks occur is Limiting the risk to data before attacks occur is accomplished through risk assessment accomplished through risk assessment &management.&management.

Page 16: Cyber War

Solutions:Solutions:

We provide the following We provide the following ProActive&ReActivetechniqs :ProActive&ReActivetechniqs :

PPeventive safety measures to tackle cyber attacks, eventive safety measures to tackle cyber attacks, setting up own team, Computer Forensics, Social setting up own team, Computer Forensics, Social Engineering, identifying vulnerabilities and patching up, Engineering, identifying vulnerabilities and patching up, investigating various Cyber Crimes, Penetration and investigating various Cyber Crimes, Penetration and other crash courses.other crash courses.

Page 17: Cyber War

Area Of ResearchArea Of Research

Cyber TerrorismCyber Terrorism

Page 18: Cyber War

Disadvantages:

•We need to be very careful how and were we put data on the web.•The US is attacked millions of times daily.•If someone were to break through our cyber security it could have a huge impact.•It could take hours to days to fix a breach in security.

Advantages:

•Using Cyber Warfare we can obtain critical information on our enemies.

•New job opportunities in the IT world in this field, especially for military

Page 19: Cyber War

Conclusion:Conclusion:o Capacity of human mind is unfathomable. It is not possible to Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe.eliminating crime from the globe.

o The only possible step is to make people aware of their rights The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and and duties (to report crime as a collective duty towards the society) and further making the application further making the application oof the laws more stringent to check crime.f the laws more stringent to check crime.

http://mutex.gmu.edu:2048/login?url=http://

Page 20: Cyber War

Thank You