emerging threats of cyberterrorism
DESCRIPTION
TRANSCRIPT
EMERGING THREATS OF CYBERTERRORISM
“Tomorrow's terrorist may be able to do more with a keyboard then with bomb”
INTRODUCTION
Distribution Denial of Service attack, disrupting services, DNS attacks, uploading computer viruses, worms and malwares, harassing individuals and companies, fraudulent
transactions Just examples of what hacktivist can do with just a computer and internet connection
Internet now offers genuine targets that will become attractive to certain terrorist organisations.
In today’s world, computer, an internet connection and few well-aimed clicks can lead to
cyberterrorism.
Terrorism refer only to those violent acts which are intended to create fear (terror); are perpetrated for a religious, political or, ideological goal; and
deliberately target or disregard the safety of civilians.
Cyberspace refers to the global network of independent information technology infrastructure, telecommunication
networks and computer processing systems in which online communication takes place.
CYBERTERRORISM
DEFINING CYBERTERRORI
SM
CYBERTERRORISM IS THE USE OF INTERNET BASED ATTACKS IN TERRORIST ACTIVITIES,
INCLUDING LARGE-SCALE DISRUPTING SERVICES, ESPECIALLY PERSONAL COMPUTERS ATTACHED BY INTERNET CONNECTION, BY THE MEANS OF TOOLS
SUCH AS COMPUTER VIRUSES, MALWARES, WORMS TROJANS ETC.
Cyberterrorims is convergence of cyberspace and terrorism.
To qualify for cyberterrorism, an attack should result in violence against person or property, or at least cause enough harm to generate
fear.
The use of computer network tools to shutdown critical infrastructures like
energy, transportation etc. or to coerce or intimidate government or civilian
population is also cyberterrorism.
The term cyberterrorism was first coined by Barry Collin in 1980’s by saying
“Protect yourself from the Cyberterrorism”.
Dorothy E. Denning defines cyberterrorism
as:
Unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or
coerce a government or its people in furtherance of political or social objective.
For any hacktivist, it is very cheap, speedy and straightforward to initiate attacks against critical infrastructure.
Cost of personal computer and internet
accessLess than a minute
Using freely available intruder tools
It is costly, long term and intricate to take the steps needed to harden the information infrastructure to make it less vulnerable to attack, and to facilitate in responding more effectively and efficiently when attacks do happen.
International efforts and funding
Research, development and
deploymentTechnically and
politically
SOME ILLUSTRATION
SIn 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."
In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a
two-week period. The messages read "We are the Internet Black Tigers and we're doing this to
disrupt your communications." Intelligence authorities characterized it as the first known attack
by terrorists against a country's computer systems.
India and Pakistan have emerged in a long-term dispute over Kashmir. The dispute moved into cyberspace when pro-Pakistani hackers began repeatedly attacking computers in India.
TOOLS AND TECHNIQUES
Cyberterrorism flourishes on the development of new technology. New tools
and techniques are invented almost daily for cyberterrorism. Some of them are:
Viruses, Worms and Malwares
These are the basic tools for any cyber attack. Hacktivist will hack into
systems and upload any virus or worm which can result in system
crash.Internet and downloaded applications are the major
sources of malwares
Distributed Denial-of-service (DDOS)
Unauthorized Instructions
Domain Name Service (DNS) Attacks
Potential Attacks
CONCLUSION
Cyberterrorism is evolving concept, and there is possibility of critical
damages to infrastructure, networks and cyberspace, if not taken
seriously.
Cyberterrorism is a complex issue that is vital for information security
specialists and to some extent the society to recognize. One must be
conscious of all of its characteristics in order to better evaluate how and where
the terrorists are likely to attack our approach.
Thank You…