Beruflich Dokumente
Kultur Dokumente
V.RAKESH 09K91A0545
CONTENT
INTRODUCTION
WORKING METHODS
TARGETS
WHERE IS IT EXECUTED!
CONCLUSION
REFERENCES
INTRODUCTION
Cyber terrorism is a controversial term some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic choose Cyber terrorism is the use of Internet based attacks in terrorist activities.
computer networks especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
terrorism and cyberspace. This leads to unlawful attacks and threats of attacks against computer , networks and the info stored therein. order to qualify as cyber terrorism an attack In results in violence against person or property, or at least causes enough harm to generate fear. Many of these attacks are done using powerful software applications made readily available across the worldwide web.
"The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically
Diversion
Low risk of personnel injury Inexpensive Quick Remote control Few resources are needed
network)illegally or without authorization. MISINFORMATION: To provide with incorrect information. VIRUS: A computer program that duplicates itself
in a manner that is harmful to normal computer use. Most virus work by attaching them self with other program.
WORM: A malicious program that replicates itself
Three groups have been defined: Simple unstructured : Conduct basic hacks against individuals using tools created by someone else. Little command and control. Advanced structured (2-4): Conduct more sophisticated attacks against multiple systems or networks and possibly the ability to create or modify tools. Elementary command and control. Complex coordinated(6-10): Capability for coordinated attacks causing mass disruption, integrated defenses including cryptography, Ability to create sophisticated hacking tools. Highly capable command and control.
Could be hacked into. Banking systems could be violated and all of our money could be stolen. Bombs and other explosives could be set off by remote. Hospitals could lose all of their information. Learn government secrets and plans. The tampering of our water systems.
government
Hospitals Banks Personal computers
can be manipulated by various mean but what of the people who have the ability to do this is there motive. This is why Cyber Terrorism is so dangerous, most hackers do posses the knowledge, but lack the motivation to create such violence and severe disruption . However many terrorist pride themselves on his ability. Despite the many actions of the few, there are few indications that this is going to become a wide spread tactic of terrorists.
Examples are hacking into computer systems, introducing viruses to vulnerable networks, website defacing, Denial-of-service attacks, or terroristic threats made via electronic communication
complexity
Systems are complex, and thus harder to control an attack.
Unless people are injured there is less drama and emotional appeal Terrorist close minded, and less likely to switch from old means of attack unless in adequate
CONCLUSION
The Internet was developed primarily as an unregulated, open
architecture. Not only are we observing a predictable backlash to the corporatization of the network, where the tools of destruction can easily be placed in the hands of the dissatisfied or malevolent people, we must also deal with the fact that the infrastructure is ideally suited to criminal activities. Some of these activities are being promoted as cyber terrorism;
PREVENTION & PROTECTION Be cautious about opening email attachments Complete software Updates Create difficult passwords Download anti-virus softwares Uninstall unused applications or services
REFERENCES
Forms of cyber terrorism I) Privacy violation: The law of privacy is the recognition of the individual's right to be let alone and to have his personal space inviolate. The right to privacy as an independent and distinctive concept originated in the field of Tort law, under which a new cause of action for damages resulting from unlawful invasion of privacy was recognised II) Secret information appropriation and data theft: The information technology can be misused for appropriating the valuable Government secrets and data of private individuals and the Government and its agencies
III) Distributed denial of services attack: The cyber terrorists may also use the method of distributed denial of services (DDOS) to overburden the Government and its agencies electronic bases. (IV) NETWORK DAMAGE ANDDISRUPTIONS: The main aim of cyber terrorist activities is to cause networks damage and their disruptions. This activity may divert the attention of these curity agencies for the time being thus giving the terrorists extra time and makes their task comparatively easier. This process may involve a combination of computer tampering, virus attacks, hacking, etc