Sie sind auf Seite 1von 17

BY

V.RAKESH 09K91A0545

UNDER THE GUIDANCE OF P .ANJIBABU,(M.TECH)

CONTENT
INTRODUCTION

HOW DOES IT WORK


HOW ADVANTAGES IT IS TO TERRORISTS

WORKING METHODS
TARGETS

WHERE IS IT EXECUTED!
CONCLUSION

REFERENCES

INTRODUCTION
Cyber terrorism is a controversial term some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic choose Cyber terrorism is the use of Internet based attacks in terrorist activities.

It includes acts of deliberate, large-scale disruption of

computer networks especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Cyber terrorism is generally understood as the crossing over of

terrorism and cyberspace. This leads to unlawful attacks and threats of attacks against computer , networks and the info stored therein. order to qualify as cyber terrorism an attack In results in violence against person or property, or at least causes enough harm to generate fear. Many of these attacks are done using powerful software applications made readily available across the worldwide web.

"The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically

why it has such opinion ?


There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.

Why would a terrorist resort to cyber terrorism?


Anonymity
Can cause a wide range of damage Low risk of detection

Diversion
Low risk of personnel injury Inexpensive Quick Remote control Few resources are needed

HOW DOES CYBER TERRORISM WORK


HACKING: To gain access to (computer file or

network)illegally or without authorization. MISINFORMATION: To provide with incorrect information. VIRUS: A computer program that duplicates itself

in a manner that is harmful to normal computer use. Most virus work by attaching them self with other program.
WORM: A malicious program that replicates itself

until it fills all of the storage space on a drive or network.

Three groups have been defined: Simple unstructured : Conduct basic hacks against individuals using tools created by someone else. Little command and control. Advanced structured (2-4): Conduct more sophisticated attacks against multiple systems or networks and possibly the ability to create or modify tools. Elementary command and control. Complex coordinated(6-10): Capability for coordinated attacks causing mass disruption, integrated defenses including cryptography, Ability to create sophisticated hacking tools. Highly capable command and control.

How does cyber Terrorism affect you and your future?


Air traffic control towers or our airlines infrastructure

Could be hacked into. Banking systems could be violated and all of our money could be stolen. Bombs and other explosives could be set off by remote. Hospitals could lose all of their information. Learn government secrets and plans. The tampering of our water systems.

Where is cyber crime committed?


Cyber space
Computer systems infrastructure I.E

government
Hospitals Banks Personal computers

Why to worry of this?


We can clearly see that the infrastructure is weak and

can be manipulated by various mean but what of the people who have the ability to do this is there motive. This is why Cyber Terrorism is so dangerous, most hackers do posses the knowledge, but lack the motivation to create such violence and severe disruption . However many terrorist pride themselves on his ability. Despite the many actions of the few, there are few indications that this is going to become a wide spread tactic of terrorists.

Examples are hacking into computer systems, introducing viruses to vulnerable networks, website defacing, Denial-of-service attacks, or terroristic threats made via electronic communication

complexity
Systems are complex, and thus harder to control an attack.

Unless people are injured there is less drama and emotional appeal Terrorist close minded, and less likely to switch from old means of attack unless in adequate

CONCLUSION
The Internet was developed primarily as an unregulated, open

architecture. Not only are we observing a predictable backlash to the corporatization of the network, where the tools of destruction can easily be placed in the hands of the dissatisfied or malevolent people, we must also deal with the fact that the infrastructure is ideally suited to criminal activities. Some of these activities are being promoted as cyber terrorism;

PREVENTION & PROTECTION Be cautious about opening email attachments Complete software Updates Create difficult passwords Download anti-virus softwares Uninstall unused applications or services

REFERENCES

Forms of cyber terrorism I) Privacy violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. The right to privacy as an independent and distinctive concept originated in the field of Tort law, under which a new cause of action for damages resulting from unlawful invasion of privacy was recognised II) Secret information appropriation and data theft: The information technology can be misused for appropriating the valuable Government secrets and data of private individuals and the Government and its agencies

III) Distributed denial of services attack: The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. (IV) NETWORK DAMAGE ANDDISRUPTIONS: The main aim of cyber terrorist activities is to cause networks damage and their disruptions. This activity may divert the attention of these curity agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier. This process may involve a combination of computer tampering, virus attacks, hacking, etc

Das könnte Ihnen auch gefallen