emerging threats of cyberterrorism

12
EMERGING THREATS OF CYBERTERRORISM “Tomorrow's terrorist may be able to do more with a keyboard then with bomb”

Upload: nishith-pandit

Post on 30-Nov-2014

764 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Emerging threats of cyberterrorism

EMERGING THREATS OF CYBERTERRORISM

“Tomorrow's terrorist may be able to do more with a keyboard then with bomb”

Page 2: Emerging threats of cyberterrorism

INTRODUCTION

Distribution Denial of Service attack, disrupting services, DNS attacks, uploading computer viruses, worms and malwares, harassing individuals and companies, fraudulent

transactions Just examples of what hacktivist can do with just a computer and internet connection

Internet now offers genuine targets that will become attractive to certain terrorist organisations.

In today’s world, computer, an internet connection and few well-aimed clicks can lead to

cyberterrorism.

Page 3: Emerging threats of cyberterrorism

Terrorism refer only to those violent acts which are intended to create fear (terror); are perpetrated for a religious, political or, ideological goal; and

deliberately target or disregard the safety of civilians.

Cyberspace refers to the global network of independent information technology infrastructure, telecommunication

networks and computer processing systems in which online communication takes place.

CYBERTERRORISM

Page 4: Emerging threats of cyberterrorism

DEFINING CYBERTERRORI

SM

CYBERTERRORISM IS THE USE OF INTERNET BASED ATTACKS IN TERRORIST ACTIVITIES,

INCLUDING LARGE-SCALE DISRUPTING SERVICES, ESPECIALLY PERSONAL COMPUTERS ATTACHED BY INTERNET CONNECTION, BY THE MEANS OF TOOLS

SUCH AS COMPUTER VIRUSES, MALWARES, WORMS TROJANS ETC.

Cyberterrorims is convergence of cyberspace and terrorism.

To qualify for cyberterrorism, an attack should result in violence against person or property, or at least cause enough harm to generate

fear.

The use of computer network tools to shutdown critical infrastructures like

energy, transportation etc. or to coerce or intimidate government or civilian

population is also cyberterrorism.

Page 5: Emerging threats of cyberterrorism

The term cyberterrorism was first coined by Barry Collin in 1980’s by saying

“Protect yourself from the Cyberterrorism”.

Dorothy E. Denning defines cyberterrorism

as:

Unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or

coerce a government or its people in furtherance of political or social objective.

Page 6: Emerging threats of cyberterrorism

For any hacktivist, it is very cheap, speedy and straightforward to initiate attacks against critical infrastructure.

Cost of personal computer and internet

accessLess than a minute

Using freely available intruder tools

It is costly, long term and intricate to take the steps needed to harden the information infrastructure to make it less vulnerable to attack, and to facilitate in responding more effectively and efficiently when attacks do happen.

International efforts and funding

Research, development and

deploymentTechnically and

politically

Page 7: Emerging threats of cyberterrorism

SOME ILLUSTRATION

SIn 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."

In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a

two-week period. The messages read "We are the Internet Black Tigers and we're doing this to

disrupt your communications." Intelligence authorities characterized it as the first known attack

by terrorists against a country's computer systems.

India and Pakistan have emerged in a long-term dispute over Kashmir. The dispute moved into cyberspace when pro-Pakistani hackers began repeatedly attacking computers in India.

Page 8: Emerging threats of cyberterrorism

TOOLS AND TECHNIQUES

Cyberterrorism flourishes on the development of new technology. New tools

and techniques are invented almost daily for cyberterrorism. Some of them are:

Viruses, Worms and Malwares

These are the basic tools for any cyber attack. Hacktivist will hack into

systems and upload any virus or worm which can result in system

crash.Internet and downloaded applications are the major

sources of malwares

Page 9: Emerging threats of cyberterrorism

Distributed Denial-of-service (DDOS)

Page 10: Emerging threats of cyberterrorism

Unauthorized Instructions

Domain Name Service (DNS) Attacks

Potential Attacks

Page 11: Emerging threats of cyberterrorism

CONCLUSION

Cyberterrorism is evolving concept, and there is possibility of critical

damages to infrastructure, networks and cyberspace, if not taken

seriously.

Cyberterrorism is a complex issue that is vital for information security

specialists and to some extent the society to recognize. One must be

conscious of all of its characteristics in order to better evaluate how and where

the terrorists are likely to attack our approach.

Page 12: Emerging threats of cyberterrorism

Thank You…