Cyber terrorism involves using computers or technology to intentionally disrupt services or spread fear. It can target critical infrastructure like communication systems. Three levels of cyberterrorist groups exist from simple hackers to highly coordinated complex attacks. Preventing cyber terrorism requires intelligence gathering, public-private cooperation, security training, and readiness for attacks targeting sectors like finance, transportation and utilities. Companies and governments must prioritize system updates, strong passwords, firewalls and intrusion detection to protect against potential cyber attacks.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
100%(10)100% found this document useful (10 votes)
9K views23 pages
Cyber terrorism involves using computers or technology to intentionally disrupt services or spread fear. It can target critical infrastructure like communication systems. Three levels of cyberterrorist groups exist from simple hackers to highly coordinated complex attacks. Preventing cyber terrorism requires intelligence gathering, public-private cooperation, security training, and readiness for attacks targeting sectors like finance, transportation and utilities. Companies and governments must prioritize system updates, strong passwords, firewalls and intrusion detection to protect against potential cyber attacks.
Cyber terrorism involves using computers or technology to intentionally disrupt services or spread fear. It can target critical infrastructure like communication systems. Three levels of cyberterrorist groups exist from simple hackers to highly coordinated complex attacks. Preventing cyber terrorism requires intelligence gathering, public-private cooperation, security training, and readiness for attacks targeting sectors like finance, transportation and utilities. Companies and governments must prioritize system updates, strong passwords, firewalls and intrusion detection to protect against potential cyber attacks.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
Cyber terrorism involves using computers or technology to intentionally disrupt services or spread fear. It can target critical infrastructure like communication systems. Three levels of cyberterrorist groups exist from simple hackers to highly coordinated complex attacks. Preventing cyber terrorism requires intelligence gathering, public-private cooperation, security training, and readiness for attacks targeting sectors like finance, transportation and utilities. Companies and governments must prioritize system updates, strong passwords, firewalls and intrusion detection to protect against potential cyber attacks.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online from Scribd
perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda. Cyberterrorism Cyber terrorism occurs when the destructive nature of the “act itself” is carried out via computers or other cyber/electronic means.
Example: Terrorists hack critical
infrastructure system (such as a telephone switch) causing a loss of communication for an extended period of time. Cyber Terrorism • Cyber terrorism is generally understood as the crossing over of terrorism and cyberspace. This leads to unlawful attacks and threats of attacks against computer, networks and the info stored therein.
• In order to qualify as cyber terrorism an attack results in
violence against person or property, or at least causes enough harm to generate fear.
• Many of these attacks are done using powerful software
applications made readily available across the world wide web. Cyber Terrorism Open war is upon you whether you would risk it or not
• Cyberspace is constantly under attack, be it from spies,
thieves, saboteurs or thrill seeking 11 year olds. DOS attacks are launched, data is sabotaged, inbox’s are flamed. Not to mention the countless virus’s that are released, many make use of fraudulent transactions and harass workers, companies, and home users.
• These attacks are serious, and costly.
Cyber terrorism
• In order for Cyber Terrorism to work two
things must happen, there must be targets that are vulnerable to attack which could lead to violence and harming someone; and also somebody to carry out these threats. Cyber Terrorism • We can clearly see that the infrastructure is weak and can be manipulated by various mean…but what of the people who have the ability to do this…is there motive. This is why Cyber Terrorism is so dangerous, most hackers do posses the knowledge, but lack the motivation to create such violence and severe disruption. However many terrorist pride themselves on his ability.
• Despite the many actions of the few, there are few
indications that this is going to become a widespread tactic of terrorists. Cyber Terrorism • Three groups have been defined:
• Simple unstructured: Conduct basic hacks against
individuals using tools created by someone else. Little command and control. • Advanced structured (2-4): Conduct more sophisticated attacks against multiple systems or networks and possibly the ability to create or modify tools. Elementary command and control. • Complex coordinated(6-10): Capability for coordinated attacks causing mass disruption, integrated defenses including cryptography, Ability to create sophisticated hacking tools. Highly capable command and control. Cyber Terrorism Drawbacks - • Systems are complex, and thus harder to control an attack. • Unless people are injured there is less drama and emotional appeal • Terrorist close minded, and less likely to switch from old means of attack unless inadeuqate Cyber Terrorism • In conclusion at the present cyber terrorism to the extreme is not as much of a burden, however general cyber crime is very much a part of today’s cyberspace; and cyber terrorism is very likely to be a few years in the future but nevertheless coming. Imagine Planning for These Contingencies Why Cyber Attack on Critical Infrastructures? National Security – Reduce the U.S.’s ability to protect its interests Public Psyche – Erode confidence in critical services and the government Economic impact – Damage economic systems Enhancement of Physical Attacks – Physical damage/distraction efforts Asymmetric Warfare – Lack of attribution, low cost/high potential impact Vulnerability Types Computer based – Poor passwords – Lack of appropriate protection/or improperly configured protection Network based – Unprotected or unnecessary open entry points Personnel based – Temporary/staff firings – Disgruntled personnel – Lack of training Facility based – Servers in unprotected areas – Inadequate security policies Cyber Terrorism Prevention – Old Methods for New Problem Liaison Critical Infrastructure Companies, i.e. FBI InfraGard Internet Service Providers Universities Internet Cafes Hacker clubs IT companies, developers International, local law enforcement Look – on the Internet Coordinate - national security, terrorist personnel Sophistication of Cybercrime • Simple Unstructured: Individuals or groups working with little structure, forethought or preparation • Advanced Structured: Groups working with some structure, but little forethought or preparation • Complex Coordinated: Groups working with advance preparation with specific targets and objectives. Terrorist Groups The Future of Terrorism Terrorism is carried out by disrupting activities, undermining confidence, and creating fear. In the future, cyberterrorism may become a viable option to traditional physical acts of violence due to: – Anonymity – Diverse targets – Low risk of detection – Low risk of personnel injury – Low investment – Operate from nearly any location – Few resources are needed What can be done to prevent an electronic terrorist attack? Effective use of intelligence gathered from all sources Continued enhancement of resources Public/Private interaction Computer security and awareness training Continuing education regarding terrorist trends and methodologies Perpetual readiness to defend against attacks Commercial Sector a Key Target Communication systems News organizations Telephony suppliers Corporations Component suppliers (boots, food, radios, etc.) Civilian consulting companies Financial institutions Government funds tied up in commercial banks Healthcare industry Pharmacies, hospitals, clinics Drug companies (vaccines, antibiotics) But Companies Not the Only Targets Power grids For 11 days in Feb 2001, a development server at cal-ISO electricity exchange was left connected to the internet and was being quietly hacked Transportation systems “A foreign adversary could significantly hinder U.S. Forces in reaching, say, the Persian gulf or Taiwan straits by attacking the computers at commercial harbor facilities used to ship ammunition or the air traffic control system that would be needed to support and airlift personnel and supplies” (Bruce Berkowitz) Water authorities Some Specifics: Be Prepared Maintain high alert & vigilance Update OS and applications regularly Enforce strong passwords “Lock down" systems Keep anti-virus software installed and up- to-date Employ intrusion detection systems and firewalls