Sie sind auf Seite 1von 18

CYBER TERRORISM

CYBER TERRORISM OVER VIEW Introduction Terrorism? Cyber terrorism? History Types of Cyber Crime Frequently Used Cybercrimes Reasons For Cybercrimes Victims of cybercrimes Cyber criminals Prevention of Cyber crime CONCLUSION

CYBER TERRORISM

OVER VIEW

As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat.

Introduction TERRORISM

CYBER TERRORISM

TERRORISM can be defined as the unlawful use or threatened use of force or violence by a person or an organized group against people or property with the intention of intimidating or coercing societies or governments often for ideological or political reasons

CYBER TERRORISM

Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least. The difference between the conventional approaches of terrorism and new methods is primarily that it is possible to affect a large multitude of people with minimum resources on the terrorist's side, with no danger to him at all. We also glimpse into the reasons that caused terrorists to look towards the Web, and why the Internet is such an attractive alternative to them. The growth of Information Technology has led to the development of this dangerous web of terror, for cyberterrorists could wreak maximum havoc within a small time span. Various situations that can be viewed as acts of cyberterrorism have also been covered. Banks are the most likely places to receive threats, but it cannot be said that any establishment is beyond attack. Tips by which we can protect ourselves from cyberterrorism have also been covered which can reduce problems created by the cyberterrorist.We, as the Information Technology people of tomorrow need to study and understand the weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyberterrorists. A number of issues here are ethical, in the sense that computing technology is now available to the whole world, but if this gift is used wrongly, the consequences could be disastrous. It is important that we understand and

CYBER TERRORISM
mitigate cyberterrorism for the benefit of society, try to curtail its growth, so that we can heal the present, and live the future There are some that say cyberterrorism does not exist and is really a matter of hacking or information warfare. They disagree with labeling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies

CYBER TERRORISM HISTORY The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network). The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner. 1997 hacker disabled the traffic control tower at a Mass. Airport. No accidents caused , but service was affected

CYBER TERRORISM

Types of Cyber Crime Hacking

CYBER TERRORISM
- Hacking in simple terms means an illegal intrusion into a computer system without permission of computer owner/user. Hackers write or use ready-made computer programs to attack the target computer. Virus Dissemination:

Malicious software that attaches itself to

other software. (Virus, worms, Trojan horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious Cyber Pornography

This would include pornographic websites; pornographic magazines produced using computers. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. Intellectual Property Crimes

CYBER TERRORISM

Intellectual property (IP) crime is a generic term used to describe a wide range of counterfeiting and piracy offences. These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc.

Software Piracy

CYBER TERRORISM
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software. Email spoofing

CYBER TERRORISM

A spoofed email is one that appears to originate from one source but actually has been sent from another source

Cyber Stalking

CYBER TERRORISM

The Oxford dictionary defines stalking as "pursuing stealthily". Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Cyber Defamation - This occurs when defamation takes place with the help of computers and / or the Internet. Cyber Defamation is a crime conducted in cyberspace, usually through the Internet, with the intention of defaming others.

Phishing

CYBER TERRORISM

The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .

FREQUENTLY USED CYBER CRIMES Unauthorized access to computer systems or networks

CYBER TERRORISM
This is generally referred as Hacking. That is accessing the proper authorization. Theft of information contained in electronic form This includes theft of information stored in computer hard disks, removable storage media etc. Email bombing It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing Data diddling This is altering raw data just before a computer processes it and then changing it back after the processing is completed. Logic Bomb it is a program code , inserted intentionally , that designed to execute or explode under circumstances information of others without

Denial of Service attack

CYBER TERRORISM

The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example. Virus / worm attacks It is a program usually hidden with in another seemingly innocuous program which harmful for the system Trojan attacks It means unauthorized programmer. It gains control over anothers system by representing itself as an authorized programmer. Web jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another Categories The Cyber crimes are categorized as the following

CYBER TERRORISM
i. ii. iii. Cyber crimes against persons Cyber crimes against Individual Property Cyber crimes against government Under these categorize there are many ways to done Crimes. Here let we see some ways Against persons I. Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. ii. Cyber-stalking : Cyber stalking involves following a person movements across the Internet by posting messages. iii. Email spoofing:

A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates. Against properties i. Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. ii. Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it. Against government The recent example

CYBER TERRORISM
may be cited of Osama Bin Laden, deployment system during Iraq war. In news days before 6 official website of in Indian Govt. were hacked It is found that the Google maps has been used as the source of information for intruding into the city of Mumbai. REASONS FOR CYBER CRIMES Capacity to store data in comparatively small space Easy to access Complex Negligence Loss of evidence CYBER CRIMINALS Children and adolescents between the age group of 6 18 years Organised hackers Professional hackers / crackers Discontented employees Types of Cyber attacks by %(Source- FBI) Financial fraud Sabotage of data/networks Theft of proprietary information System penetration from the outside Denial of service 27% 17% 20% 25% 11% the LTTE, and attack on Americas army

CYBER TERRORISM
Unauthorized access by insiders Employee abuse of internet privileges Viruses PRACTICAL STEPS FOR PREVENTION OF CYBER CRIME Use latest & up date antivirus software Frequent password changing. Firewalls Safe surfing. Frequent virus checks Email filters. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children Avoid disclosing any information pertaining to oneself. Avoid sending any photograph online particularly to strangers. Keep back up volumes. Never send your credit card number to any site that is not secured. Use of firewalls may be beneficial. Indian law & Cyber terrorismIn India there is no law, which is specifically dealing with prevention of malware through aggressive defense. Thus, the analogous provisions have to be applied in a purposive manner. The protection 71% 79% 85%

CYBER TERRORISM
against malware attacks can be claimed under the following categories: (1) Protection available under the Constitution of India, and (2) Protection available under other statutes. CONCLUSION Cyber crime is a multi-billion dollar problem. It is criminals Activity committed on internet. This is a broad term that Describes everything from electronic cracking to denial of Service attacks that cause electronic commerce sites to loss Money .

THANK YOU

Das könnte Ihnen auch gefallen