Professional Documents
Culture Documents
Cyber Terrorism.8190108.Powerpoint
Cyber Terrorism.8190108.Powerpoint
PRESENTED BY:
MEENU SHUKLA
Mtech(1st sem CYB)
ERP: 0151CYB019
07/03/2024
CYBER TERRORISM
07/03/2024
INTRODUCTION ABOUT TOPICS
History
Features
Working Strategy
Common attack
Forms
Examples
Countering IMPACT
Affect In Future
Prevention & Protection
Punishment
Conclusion
References 07/03/2024
INTRODUCTION
07/03/2024
History of Cyber Terrorism
07/03/2024
What is Cyber terrorism???
07/03/2024
Categorized By:
07/03/2024
Crimes Which Comes Under
Cyber Terrorism
Cyber Extortion
Cyber Vandalism
Cyber Hate
Cyber Harassment
07/03/2024
Brief Definitions(Contd…)
Extortion is a crime involving an attack or threat of attack against an enterprise, coupled
with a demand for money to avert or stop the attack.
Ex: Nokia (FINNLAND)
What happened: A news broke in 2007 about a blackmail case that had Nokia pay
millions of euros in extortion money. The Finnish phone manufacturer was being held
hostage by a hacker who managed to steal an encryption key used in its prevalent Symbian
operating system. The attacker threatened to make the key public if Nokia didn't meet
payment demands, putting Symbian at risk of other criminals using the key to upload
legitimate-looking but malicious apps to phones worldwide.
Vandalism includes the addition, removal, or other modification of the text that is either
humorous, nonsensical, or that is of an offensive, humiliating, or otherwise degrading
nature of that project. Ex: Wikipedia
Cyber Hate refers to any use of electronic communications technology to spread racist,
extremist or terrorist messages or information. These electronic communications
technologies include the Internet (i.e., Web-sites, social networking sites, dating sites,
blogs, online games and E-mail. 07/03/2024
Features of Cyber Terrorism
Difficulty Identifying Attackers: It remains difficult to determine
the identity of the initiators of most cyber attacks.
Lack of Boundaries: Attacks can originate from anywhere in the
world and from multiple locations simultaneously.
Speed of Development: The time between the discovery of a new
vulnerability and the emergence of a new tool or technique that
exploits the vulnerability is getting shorter
Low Cost of Tools: The technology employed in attacks is simple
to use, inexpensive, and widely available.
Automated Methods: The methods of attack have become
automated and more sophisticated, resulting in greater damage from
a single attack.
07/03/2024
Working Strategy of Cyber terrorism..
07/03/2024
How does Cyber Terrorism work?
Eavesdropping: Any data that is transmitted over
a network is at some risk of being eavesdropped,
or even modified by a malicious person.
Indirect attacks: Attacks which is launched by a
third party computer which has been taken over
remotely.
Backdoors: A backdoor is a potential security
risk. Attackers often use back doors that they
detect or install themselves, as part of an exploit.
07/03/2024
TOOLS FOR CYBER TERRORISM
Logic Bomb:
Cryptography: I Steganography:
A piece of Denial of
Virus: Worm: Trojan Horse: code Service: nformation is Writing hidden
A computer A standalone A non-self- intentionally The attacker
transformed into messages in a
unreadable way that no one,
program that computer replicating type inserted into a sends almost format (cipher apart from the
can replicate program that of malware software innumerable text). Only those
itself and replicates which facilitates system that requests for who possess a
sender and
spread from itself in order unauthorized will set off a information/e- secret key can intended
one to spread to access to the malicious mail that cause a decipher (or recipient,
computer to other users computer function when computer decrypt) the suspects the
another. computer system. specified systems to
crash.
message into existence of the
conditions are plain text. message.
met.
07/03/2024
Interesting, right?
This is just a sneak preview of the full presentation. We hope you like it! To see the
rest of it, just click here to view it in full on PowerShow.com. Then, if you’d like, you
can also log in to PowerShow.com to download the entire presentation for free.