23
Cyber Terrorism When technology become Weapon

Cyber Terrorism PPT

Embed Size (px)

DESCRIPTION

a presentation on cyber terrorism

Citation preview

  • Cyber TerrorismWhen technology become Weapon

  • Team MembersMonami SahaSakshi ShreyaAkash SarkarPabitra GhoraiAritra Bhattacharyya

  • Table of ContentsWhat Is Cyber TerrorismCommon TermsFeatures3 most common methodsTypes of Crimes and CriminalsStatisticsCyber Crime RecordsHow does it affect you and how do you defend yourself?Conclusion

  • What is Cyber Terrorism ?The illegal use of computers, electronic communication systems and the internet to achieve some goal.Terrorism conducted in cyberspace, where criminals attempt to disrupt computer or telecommunications service.1Cyber terrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."

  • Common TermsHacking : To gain access to a computer (file or network) illegally or without authorization. Cryptanalysis is the study of analyzing information systems in order to study the hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.Phishing is the illegal attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

  • Virus: A computer program that duplicates itself in a manner that is harmful to normal computer use. Most viruses work by attaching themselves to another program. The amount of damage varies; viruses may erase all data or do nothing but reproduce themselves.Worm: A malicious program that replicates itself until it fills all of the storage space on a drive or networkTrojan horse, or Trojan, in computing is generally a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm

  • Features of Cyber TerrorismDifficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks.Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously.Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorterLow Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available. Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack.

  • 3 most common attack methodsIP spoofing.Password Cracking. Denial-of-service attacks.

  • IP SpoofingRefers to creation of IP packets with forged source IP address with the purpose of concealing the identity of sender.Mostly used in Denial-of-Service attacks.Most effective in corporate networks where users can log in without a username or password.

  • Password CrackingPassword cracking can be implemented using brute-force attacks, Trojan horse programs and IP spoofing.Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks.Ordinary desktop computers can test over a hundred million passwords per second using password cracking tools that run on a general purpose CPU and billions of passwords per second using GPU-based password cracking tools.

  • Denial-of-Service attacksDenial-of-service attacks focus on making a service unavailable to intended users.2 forms of DoS attacks: those that crash services and those that flood services.One common attack method involves saturating the target machine with communications requests such that it cannot respond to the traffic.

  • Cost & Means of AttackCost of Capability195519601970197519851945Today

  • Types of Cyber Crime

    Hacking without any intention to commit any further offence. Unauthorized access with intention to commit further offences. These can include theft, fraud, miss-appropriations, forgery, crackingDistribution of digital information through use of virus, trogon horses, logic bombs.

  • Types of Cyber CriminalsCode hacker :They know computers inside out. They can make the computer do nearly anything they want it to. Crackers: They break into computer systems, operating systems and their security is their favorite pastimeCyber Pumps: They are masters of cryptographyPhreakers : They combine their in-depth knowledge of the Internet and mass telecommunication systems.

  • Statistics on Cyber Terrorism

    Military stations, air traffic control centers, banks and telecommunication networks are the most common targets but others are police, rescue systems and etc.

    The graph below shows amateur hackers. They are the most threat on the Internet, they are responsible for about 90% of all activity.

    Some times the govt. carries out an attack to test its defense system. They have found 88% of 3000 attacks. 96% of the entries weren't detected but4% were and 5% were reported and investigated.

    The FBI estimates that $138 million is lost every year to hackers.

  • Sabotage $ 871,000System Penetration Website Defacement $ 901,500$ 958,100 Misuse of public web AppsTelecom Fraud Abuse of wireless Network Financial Fraud Unauthorized Access Laptop Theft$ 2,747,000$ 3,997,500$ 4,278,205$ 6,734,500$ 7,670,500$ 10,159,250Insider Net Abuse$ 10,601,055Theft of Proprietary info. $ 11,460,000Denial of Service $ 26,064,050Virus $ 55,053,900Total Losses for 2014= $.141,496,560Fourteen Crore Fourteen Lakh Ninety Six Thousand Five hundred Sixty.

  • The Vulnerability MatrixGovernmentNatural Gas26,000 FDIC institutions2,800 power plants104 commercial nuclear plants1,600 municipal wastewater facilities2 million miles of pipelines66,000 chemical plants5,800 registered hospitals

    E-commerce2 billion miles of cable5,000 airports300 maritime ports300,000 production sites120,000 miles of major rails3,000 govt. facilitiesHome UsersBroadband ConnectionsWirelessViruses, WormsBankingTelecomEmergency ServicesChemicalRailNatural GasWaterWaste WaterTransportationOil80,000 DamsInsidersConfigurationProblems150,000 miles transmission lines130 overlapping grid controllers

  • Recent Cyber AttacksApril 2012: The Syrian Electronic Army took down the official blog of social media website LinkedIn. The page was redirected instead to a site supporting Bashar al-Assad.23 April 2013: The SEA hijacked the Associated Press Twitter account and falsely claimed the White House had been bombed and President Barack Obama injured.May 2013: The Twitter account of The Onion was compromised by the SEA, by phishing Google Apps accounts of The Onion's employees.27 August 2013: NYTimes.com has its DNS redirected to a page that displays the message "Hacked by SEA" and Twitter's domain registrar was changed[30]

  • CYBER TERRORISM IN INDIA

    ECIL(Electronic Corporation of India Limited) which invented electro voting system in India , controlling parliament security system , Nuclear plants ,Defense etc has been a prime target.ISRO, DRDO, BARC had been victims of hackersRecently Pakistan is made a successful attack on India by circulating fake currency at elections time.According to CERT-In (the Indian Computer Emergency Response Team), which is a government-mandated information technology security organization, an estimated 14,392 websites in the country were hacked in 2012 (till October).

  • How does Cyber Terrorism affect you and your future? Air traffic control towers or our airlines infrastructure could be hacked into.Banking systems could be violated and all of our money could be stolen.Bombs and other explosives could be set off by remote.Hospitals could lose all of their information.Learn Government secrets and plansThe tampering of our information systems.

  • What do we need to do??Maintain high alert & vigilance.Update OS and applications regularly.Enforce strong passwords.Lock down" systems when not in use.Keep anti-virus software installed and up-to-date.Employ intrusion detection systems and firewalls.

  • CONCLUSIONCyber terrorism is a scary concept for many reasons.It can do possible serious damages to various aspects of our lives. It is even scarier that cyber terrorism is so difficult to catch and track and prosecute. The information age has brought us many good things, but along with those good things came some bad things too.All we can do as citizens is to protect ourselves by protecting our information, who we give it to and how much we give it out.Our government is trying to do its part, so lets support them and their efforts and stop this cyber battle.

  • Thank YOU!

    ***1 On line Webster's dictionary2 FBI

    *According to Time magazine article A Brief History ofCybercrimeBy Randy James Monday, Jun. 01, 2009Telephone networks were first targetsCorporate and academic networksDOS This attack method floods web servers, and networks with requests from many different computers at once. When these servers are flooded with so many requests, they can't process them all and freeze-up, or shut down. This can be a major problem to websites or networks vital to the national security infrastructure

    Read more: http://www.time.com/time/nation/article/0,8599,1902073,00.html#ixzz1I2klXctq*Dan VertonVice President & Executive Editor www.itsecuritymagazine.com

    This slide represents the vulnerability of the united states to cyber terrorism and the areas of where attacks could take place.UtilitiesBankingGovernmentTelcoTransportation

    *1 On line Webster's dictionary2 FBI