16
INTRODUCTION ABOUT TOPICS What is Cyber Terrorism? Types Of Cyber Terrorism Effects To Cyber Terrorism For Our Environment Statistics on Cyber Terrorism Insider Statistics in World -Economic CYBER TERRORISM TOOK PLACE WORLD WIDE Example in cyber terrorism effects in world wide Cost & Means Of Attack Security Framework for Enterprise 25 Attack History in World Conclusion Any Query???????? Presented by :-Sanjay Pariyar M.

Cyber terrorism

Embed Size (px)

Citation preview

Page 1: Cyber terrorism

INTRODUCTION ABOUT TOPICS

What is Cyber Terrorism? Types Of Cyber Terrorism Effects To Cyber Terrorism For Our Environment Statistics on Cyber Terrorism Insider Statistics in World -Economic CYBER TERRORISM TOOK PLACE WORLD WIDE Example in cyber terrorism effects in world wide Cost & Means Of Attack Security Framework for Enterprise 25 Attack History in World Conclusion Any Query????????

Presented by :-Sanjay Pariyar M.

Page 2: Cyber terrorism

1.What is Cyber Terrorism?

• A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber-terrorists spread computer viruses, and others threaten people electronically.

• Some ways they do this hacking networks and computers to find out personal information.

• The attacker distributes things that draw huge amount of attention to get information about people.

• Since computers are so powerful, downloading software for cyber terrorism is easy.

Page 3: Cyber terrorism

Types of Cyber Terrorism

I. Simple Unstructured

II. Advanced Structured

III. Complex Co-ordinated

This method doesn't do much because it can't carry out as much information.Example:- data remove etc.

This method has multiple systems and it has more control, freedom and creativity towards the attack.Example:-Banking Robbery,ATM Failure etc.

This method has intense hacking tools and is highly capable of target analysis, command, control and learning capability.Ex:-Airlines Crash,Building Crash, power Outages, System Down, Telephone Outages etc.

Page 4: Cyber terrorism

Effects To Cyber Terrorism For Our Environment

• There are a double different affects of cyber terrorism. One is financial damage. Cyber terrorism doesn’t just do damage to one person, but a mass amount of people at one time.

• Since cyber terrorism effects the economy so much, it can weak in ones country making its defense system not as strong to other terrorist attacks.

• Cyber terrorism can destroy a nation, financially, and all its security. Also, it can interrupt electrical systems and can lead to potential death.

• Some people don't think its very serious because they don't get nervous but in reality it could ruin a nation and kill a mass amount of people. The affects are very serious and even though a bomb isn't thrown or a plane isn't flown through buildings it can still be a very serious.

Page 5: Cyber terrorism

• Most people feel that military stations, air traffic control centers, banks and telecommunication networks are the most common targets but others are police, rescue systems and etc.

• The graph below shows amateur hackers. They are the most threat on the Internet, they are responsible for about 90% of all activity.

• Some times the govt. carries out an attack to test its defense system. They have found 88% of 3000 attacks. 96% of the entries weren't detected but 4% were and 5% were reported and investigated.

• In 1996, they found 40 major attacks loosing over 800 million to computer break ins.

• The FBI estimates that $138 million is lost every year to hackers. Over three years they have reported 40 threats but nothing serious.

• One time a Russian hacker, tapped into Citibank's funds and took $10 million.

Statistics on Cyber Terrorism

Page 6: Cyber terrorism

INSIDER STATISTICS IN WORLD- ECONOMICSabotage $ 871,000

System Penetration

Website Defacement

$ 901,500

$ 958,100

Misuse of public web Apps

Telecom Fraud

Abuse of wireless Network

Financial Fraud

Unauthorized Access

Laptop Theft

$ 2,747,000

$ 3,997,500

$ 4,278,205

$ 6,734,500

$ 7,670,500

$ 10,159,250

Insider Net Abuse $ 10,601,055

Theft of Proprietary info. $ 11,460,000

Denial of Service $ 26,064,050

Virus $ 55,053,900

Total Losses for 2004= Rs.141,496,560

0m 30m 40m 50m10m 20m 60m

Fourteen Crore Fourteen Lakh Ninety Six Thousand Five hundred Sixty.

Page 7: Cyber terrorism

CYBER TERRORISM TOOK PLACE WORLD WIDE

• The breakage to the banking of the country. Flooding the whole city with sewage waste.

• Cyber Crime has emerged as new level of terrorism world wide. which may even happen in India.

Jamming the per of whole city. (i.e.) The blocking of power stations.

The Bombarding of the computers connected to internets.

• Robbery of the international banks. Breaking into the plane onboard computer system forcing it to crash.

The complexity of the cyber terrorism is that this attacks can be carried out by terrorists any where in world without even touching our soil with free of cost.

Page 8: Cyber terrorism

Example in cyber Terrorism Effects in World Wide

ATM Failure

Power Outages

Poisoned Water Supply

Bridge Down

World Trade Center

Airlines Crash

Oil Refinery Fire

Telephone Outages

911 System Down

Page 9: Cyber terrorism

Cost & Means Of Attacks

1945 1955 1960 1970 -1975 1985 Today

Invasi

on

Strategic

Nuclear

Weapon

s

Missiles

ICBM & SLBMCruise Missile

Precisi

on

Guided

Muniti

ons

Computer

Availability of Capability

Cost of

Capability

Page 10: Cyber terrorism

Security OfficerProject leader for all security Related Matter

Physical Security

Access To Building

Physical Assets(Generic)

IT Hardware(computer,PSDs,

Printers)

Vehicle Fleets

Operation Manager +

Security Staffs

PeopleSecurity

PermanentStaff

Contract Staff

Third Party Employees

PartnersVisitor

Special EventsSecurity

HR+

Security Staff

IT Manager +Teams/HR/Fraud

Trades Secrets

Employee Data

Database(Market

Intelligence)

Customer Data(as Protected Under DPD)

DataSecurity

Networks

Remotes Sites

Remotes User

Application Security

Websites

Intranet

Documentation Work &

Procedures

Emergency Response Plans

(ERPs)

Business continuity Plans

(BC)Disaster

Recovery Plans(DR)

IT Manager +

Teams

Operation Manager

+IT Teams/HR

IT Security

Disaster RecoveryBusiness Cont.

BEST SECURITIES FRAMEWORK FOR ORGANIZATION

Page 11: Cyber terrorism
Page 14: Cyber terrorism

19. Presidential-Level Espionage

24.Titan Rain23. Moonlight Maze22. Epsilon

21. The Estonian Cyber war20.Sony

25. The Original Logic Bomb

Page 15: Cyber terrorism

Conclusion

Our National Security ,Databases and Economy are extremely dependent upon Automation .

Therefore ,There exist a ”Target Rich Environment” for those who would harm via Internet. So first priority is most Power High-tech Security in this environment.

Our Critical Infrastructure required joint Private/Public Efforts to Protect Them.

Page 16: Cyber terrorism

ANY QUERY