Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

CYBER TERRORISM

 PRESENTED BY:
 MEENU SHUKLA
 Mtech(1st sem CYB)
 ERP: 0151CYB019

07/03/2024
CYBER TERRORISM

“Tomorrow’s terrorist may be able to do


more damage with a keyboard than with
a bomb”

07/03/2024
INTRODUCTION ABOUT TOPICS
 History
 Features
 Working Strategy
 Common attack
 Forms
 Examples
 Countering IMPACT
 Affect In Future
 Prevention & Protection
 Punishment
 Conclusion
 References 07/03/2024
INTRODUCTION

 As the use of Internet is increasing day by day, traditional


concepts and methods of terrorism have taken new
dimensions.

 Individuals or groups can use the anonymity afforded


by cyberspace to threaten citizens, specific groups (i.e.
with membership based on ethnicity or belief),
communities and even the countries.

07/03/2024
History of Cyber Terrorism

 The term "terrorism" comes from the French word


“terrorisme”, which is based on the Latin verb terrere (to
cause to tremble).

 Public interest in cyber terrorism began in the late 1980s,


when the term was coined by Barry C. Collin in 1996.

07/03/2024
What is Cyber terrorism???

• A cyber-terrorist is a criminal who uses computer


technology and the Internet, especially to cause fear and
disruption.
• Some cyber-terrorists spread computer viruses, and others
threaten people electronically.

07/03/2024
Categorized By:

07/03/2024
Crimes Which Comes Under
Cyber Terrorism
Cyber Extortion

Cyber Vandalism

Cyber Hate

Cyber Harassment
07/03/2024
Brief Definitions(Contd…)
 Extortion is a crime involving an attack or threat of attack against an enterprise, coupled
with a demand for money to avert or stop the attack.
 Ex: Nokia (FINNLAND)
What happened: A news broke in 2007 about a blackmail case that had Nokia pay
millions of euros in extortion money. The Finnish phone manufacturer was being held
hostage by a hacker who managed to steal an encryption key used in its prevalent Symbian
operating system. The attacker threatened to make the key public if Nokia didn't meet
payment demands, putting Symbian at risk of other criminals using the key to upload
legitimate-looking but malicious apps to phones worldwide.
 Vandalism includes the addition, removal, or other modification of the text that is either
humorous, nonsensical, or that is of an offensive, humiliating, or otherwise degrading
nature of that project. Ex: Wikipedia
 Cyber Hate refers to any use of electronic communications technology to spread racist,
extremist or terrorist messages or information. These electronic communications
technologies include the Internet (i.e., Web-sites, social networking sites, dating sites,
blogs, online games and E-mail. 07/03/2024
Features of Cyber Terrorism
 Difficulty Identifying Attackers: It remains difficult to determine
the identity of the initiators of most cyber attacks.
 Lack of Boundaries: Attacks can originate from anywhere in the
world and from multiple locations simultaneously.
 Speed of Development: The time between the discovery of a new
vulnerability and the emergence of a new tool or technique that
exploits the vulnerability is getting shorter
 Low Cost of Tools: The technology employed in attacks is simple
to use, inexpensive, and widely available.
 Automated Methods: The methods of attack have become
automated and more sophisticated, resulting in greater damage from
a single attack.
07/03/2024
Working Strategy of Cyber terrorism..

 Hacking into computer systems.


 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terroristic threats made via e-mail.

07/03/2024
How does Cyber Terrorism work?
 Eavesdropping: Any data that is transmitted over
a network is at some risk of being eavesdropped,
or even modified by a malicious person.
 Indirect attacks: Attacks which is launched by a
third party computer which has been taken over
remotely.
 Backdoors: A backdoor is a potential security
risk. Attackers often use back doors that they
detect or install themselves, as part of an exploit.

07/03/2024
TOOLS FOR CYBER TERRORISM

Logic Bomb:
Cryptography: I Steganography:
A piece of Denial of
Virus: Worm: Trojan Horse: code Service: nformation is Writing hidden
A computer A standalone A non-self- intentionally The attacker
transformed into messages in a
unreadable way that no one,
program that computer replicating type inserted into a sends almost format (cipher apart from the
can replicate program that of malware software innumerable text). Only those
itself and replicates which facilitates system that requests for who possess a
sender and
spread from itself in order unauthorized will set off a information/e- secret key can intended
one to spread to access to the malicious mail that cause a decipher (or recipient,
computer to other users computer function when computer decrypt) the suspects the
another. computer system. specified systems to
crash.
message into existence of the
conditions are plain text. message.
met.

07/03/2024
Interesting, right?
This is just a sneak preview of the full presentation. We hope you like it! To see the
rest of it, just click here to view it in full on PowerShow.com. Then, if you’d like, you
can also log in to PowerShow.com to download the entire presentation for free.

You might also like