Sie sind auf Seite 1von 23

Cyber Terrorism

When technology become Weapon

Team Members

Monami Saha
Sakshi Shreya
Akash Sarkar
Pabitra Ghorai
Aritra Bhattacharyya

Table of Contents

What Is Cyber Terrorism


Common Terms
Features
3 most common methods
Types of Crimes and Criminals
Statistics
Cyber Crime Records
How does it affect you and how do you defend yourself?
Conclusion

What is Cyber Terrorism ?


The illegal use of computers, electronic communication
systems and the internet to achieve some goal.
Terrorism conducted in cyberspace, where criminals attempt
to disrupt computer or telecommunications service.
Cyber terrorism is any "premeditated, politically motivated
attack against information, computer systems, computer
programs, and data which results in violence against noncombatant targets by sub-national groups or clandestine
agents."
1

Common Terms
Hacking : To gain access to a computer (file or network)
illegally or without authorization.
Cryptanalysis is the study of analyzing information systems in
order to study the hidden aspects of the systems. Cryptanalysis is
used to breach cryptographic security systems and gain access to
the contents of encrypted messages, even if the cryptographic key
is unknown.
Phishing is the illegal attempt to acquire sensitive information
such as usernames, passwords, and credit card details (and
sometimes, indirectly, money), often for malicious reasons, by
masquerading as a trustworthy entity in an
electronic communication .

Virus: A computer program that duplicates itself in a


manner that is harmful to normal computer use. Most
viruses work by attaching themselves to another
program. The amount of damage varies; viruses may
erase all data or do nothing but reproduce
themselves.
Worm: A malicious program that replicates itself
until it fills all of the storage space on a drive or
network
Trojan horse, or Trojan, in computing is generally a nonself-replicating type of malware program containing
malicious code that, when executed, carries out actions
determined by the nature of the Trojan, typically causing loss
or theft of data, and possible system harm

Features of Cyber Terrorism


Difficulty Identifying Attackers: It remains difficult to determine
the identity of the initiators of most cyber attacks.
Lack of Boundaries: Attacks can originate from anywhere in the
world and from multiple locations simultaneously.
Speed of Development: The time between the discovery of a new
vulnerability and the emergence of a new tool or technique that
exploits the vulnerability is getting shorter
Low Cost of Tools: The technology employed in attacks is simple to
use, inexpensive, and widely available.
Automated Methods: The methods of attack have become
automated and more sophisticated, resulting in greater damage from
a single attack.

3 most common attack methods

IP spoofing.
Password Cracking.
Denial-of-service
attacks.

IP Spoofing
Refers to creation of IP packets with
forged source IP address with the
purpose of concealing the identity of
sender.
Mostly used in Denial-of-Service attacks.
Most effective in corporate networks
where users can log in without a
username or password.

Password Cracking
Password cracking can be implemented using
brute-force attacks, Trojan horse programs and IP
spoofing.
Password attacks usually refer to repeated
attempts to identify a user account and/or
password; these repeated attempts are called
brute-force attacks.
Ordinary desktop computers can test over a hundred million
passwords per second using password cracking tools that
run on a general purpose CPU and billions of passwords per
second using GPU-based password cracking tools.

Denial-of-Service attacks
Denial-of-service attacks focus on
making a service unavailable to intended
users.
2 forms of DoS attacks: those that crash
services and those that flood services.
One common attack method involves
saturating the target machine with
communications requests such that it
cannot respond to the traffic.

Cost & Means of Attack


Cost of
Capability

Availability of
Capability
1945

1955

1960

1970

1975

1985

Today

Precis
Cruise Missile
Computer
ion
Strategic
Invas
Nuclear Missiles
Guide
ion Weapons
ICBM & SLBM

Types of Cyber Crime


Hacking without any intention to
commit any further offence.
Unauthorized access with intention to
commit further offences. These can
include theft, fraud, missappropriations, forgery, cracking
Distribution of digital information
through use of virus, trogon horses,
logic bombs.

Types of Cyber
Criminals
Code
hacker :They know computers inside
out. They can make the computer do nearly
anything they want it to.
Crackers: They break into computer
systems, operating systems and their security
is their favorite pastime
Cyber Pumps: They are masters of
cryptography
Phreakers : They combine their in-depth
knowledge of the Internet and mass
telecommunication systems.

Statistics on Cyber Terrorism


Military stations, air traffic control
centers, banks and
telecommunication networks are the
most common targets but others
are police, rescue systems and etc.
The graph below shows amateur
hackers. They are the most threat
on the Internet, they are
responsible for about 90% of all
activity.
Some times the govt. carries out an
attack to test its defense system.
They have found 88% of 3000
attacks. 96% of the entries weren't
detected but4% were and 5% were
reported and investigated.
The FBI estimates that $138 million
is lost every year to hackers.

Sabotage

$ 871,000

System Penetration

$ 901,500

Website Defacement
Misuse of public web
AppsFraud
Telecom
Unauthorized Access
Laptop Theft
Financial Fraud
Abuse of wireless
Network
Insider Net Abuse
Theft of Proprietary
info.
Denial of Service
Virus

$ 958,100
$ 2,747,000

Total Losses for 2014=


$.141,496,560
Fourteen Crore Fourteen Lakh
Ninety Six Thousand Five
hundred Sixty.

$ 3,997,500
$ 4,278,205
$ 6,734,500
$ 7,670,500
$ 10,159,250
$ 10,601,055
$ 11,460,000
$ 26,064,050
$
55,053,90
0

The Vulnerability Matrix


Viruses, 5,800 registered hospitals
5,000 airports
Worms
Wireless
3,000 govt.
300 maritime
ports
2,800 power plants facilities
Broadband
Connections
104 commercial
Home
Users

Government
66,000
chemical
plants

Transportation

Insiders

150,000 miles transmission lines

Chemical

Electric

120,000 miles
of major rails

Water

Configuration

Banking

Rail130 overlapping grid controllersOil


Natural Gas

2 million miles
of pipelines

26,000 FDIC
institutions

Emergency
Services

nuclear plants

Telecom

Problems
300,000
production
sites

Waste Water
E-commerce

Natural
Gas

1,600 municipal
wastewater facilities

2 billion miles
of cable
80,000 Dams

Recent Cyber Attacks


April 2012: The Syrian Electronic Army took down the
official blog of social media website LinkedIn. The
page was redirected instead to a site supporting
Bashar al-Assad.
23 April 2013: The SEA hijacked the Associated Press
Twitter account and falsely claimed the White House
had been bombed and President Barack Obama
injured.

May 2013: The Twitter account of The Onion was


compromised by the SEA, by phishing Google
Apps accounts of The Onion's employees.
27 August 2013: NYTimes.com has its DNS
redirected to a page that displays the message
"Hacked by SEA" and Twitter's domain registrar
was changed[30]

CYBER TERRORISM IN INDIA

ECIL(Electronic Corporation of India Limited) which invented


electro voting system in India , controlling parliament security
system , Nuclear plants ,Defense etc has been a prime target.

ISRO, DRDO, BARC had been victims of hackers

Recently Pakistan is made a successful attack on India by circulating


fake currency at elections time.

According to CERT-In (the Indian Computer Emergency Response


Team), which is a government-mandated information technology
security organization, an estimated 14,392 websites in the country
were hacked in 2012 (till October).

How does Cyber Terrorism


affect you and your
Air future?
traffic control towers or our airlines
infrastructure could be hacked into.

Banking systems could be violated and all of


our money could be stolen.
Bombs and other explosives could be set off
by remote.
Hospitals could lose all of their information.
Learn Government secrets and plans
The tampering of our information systems.

What do we need to do??


Maintain high alert & vigilance.
Update OS and applications regularly.
Enforce strong passwords.
Lock down" systems when not in use.
Keep anti-virus software installed and
up-to-date.
Employ intrusion detection systems
and firewalls.

CONCLUSION
Cyber terrorism is a scary concept for many reasons.
It can do possible serious damages to various aspects
of our lives. It is even scarier that cyber terrorism is
so difficult to catch and track and prosecute.
The information age has brought us many good
things, but along with those good things came some
bad things too.
All we can do as citizens is to protect ourselves by
protecting our information, who we give it to and how
much we give it out.
Our government is trying to do its part, so lets
support them and their efforts and stop this cyber
battle.

Thank YOU!

Das könnte Ihnen auch gefallen