SlideShare une entreprise Scribd logo
1  sur  19
Cyber Terrorism -Global Threat- Carl Barrett Itayi Bunhu
Table of Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Cyber Terrorism ,[object Object],[object Object],[object Object]
What is Cyber Terrorism ,[object Object],[object Object],[object Object]
First acts of Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object]
First acts of Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Terrorism - Can This Happen ,[object Object],[object Object],[object Object],[object Object]
The Cost of Cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Vulnerability  Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial  nuclear plants 1,600 municipal wastewater facilities 2 million miles of pipelines 66,000 chemical plants 5,800 registered hospitals E-commerce 2 billion miles of cable 5,000 airports 300 maritime ports 300,000 production sites 120,000 miles of major rails 3,000 govt. facilities Home Users Broadband Connections Wireless Viruses, Worms Banking Telecom Emergency Services Chemical Rail Natural Gas Water Waste Water Transportation Oil 80,000 Dams Insiders Configuration Problems 150,000 miles transmission lines 130 overlapping grid controllers Electric
How are we protected from cyber Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS INTELLIGENCE GATHERING TO PROTECT US ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS THE DIFFERENCE BETWEEN CYBER CRIME AND CYBER TERRORISM ,[object Object],[object Object]
How is it done? ,[object Object],[object Object]
How is it done? ,[object Object],[object Object]
Summary and Conclusion ,[object Object],[object Object],[object Object],[object Object]
Summary and Conclusion ,[object Object],[object Object],[object Object],[object Object]
Summary and Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ,[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Introduction to cyber crime & law
Introduction to cyber crime & lawIntroduction to cyber crime & law
Introduction to cyber crime & lawbhp6245
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 

Tendances (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Introduction to cyber crime & law
Introduction to cyber crime & lawIntroduction to cyber crime & law
Introduction to cyber crime & law
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 

En vedette

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

En vedette (6)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à Cyberterrorismv1 (20)

28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Cyberterrorismv1

  • 1. Cyber Terrorism -Global Threat- Carl Barrett Itayi Bunhu
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. The Vulnerability Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial nuclear plants 1,600 municipal wastewater facilities 2 million miles of pipelines 66,000 chemical plants 5,800 registered hospitals E-commerce 2 billion miles of cable 5,000 airports 300 maritime ports 300,000 production sites 120,000 miles of major rails 3,000 govt. facilities Home Users Broadband Connections Wireless Viruses, Worms Banking Telecom Emergency Services Chemical Rail Natural Gas Water Waste Water Transportation Oil 80,000 Dams Insiders Configuration Problems 150,000 miles transmission lines 130 overlapping grid controllers Electric
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Notes de l'éditeur

  1. 1 – On line Webster's dictionary 2 – FBI
  2. According to the book Cyber terrorism: the use of the internet for terrorist purposes – compiled by the council of Europe The continued growing use and access of the internet is leading to this being a breeding ground for the new terrorist, the cyber terrorist The intent of these cyber terrorist is largely a three pronged: ECONOMIC CONFUSION – MEANING TO SHOW THE VULNERABILITY OF STATE AND ORGANIZATION DISCRIMINATION OF OPPONENT – SIMILAR TO THE ABOVE BUT SHOWING THEIR SUPERIORITY TECHNICALLY MONETARY INCOME – SELF EXPLANATORY BUT WILL PROVIDE FUNDS NEEDED FOR FUTURE TERRORIST ENDEAVORS
  3. According to Time magazine article A Brief History of Cybercrime By Randy James Monday, Jun. 01, 2009 Telephone networks were first targets Corporate and academic networks DOS This attack method floods web servers, and networks with requests from many different computers at once. When these servers are flooded with so many requests, they can't process them all and freeze-up, or shut down. This can be a major problem to websites or networks vital to the national security infrastructure Read more: http://www.time.com/time/nation/article/0,8599,1902073,00.html#ixzz1I2klXctq
  4. The Internet encyclopedia, Volume 1   By Hossein Bidgoli In the 1980s, Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term "cyber terrorism" to refer to the convergence of cyberspace and terrorism Listed modern cyber terrorism - remotely changing pressure in gas lines – explosions fires - computerized bombs remotely detonated using unique numeric patterns if one doesn’t detonate the others detonate simultaneously - Future air traffic attacks – mid air collisions etc
  5. Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy Dorothy E. Denning Georgetown University Collins - potential threats Food manufacturing – increasing chemicals or additives to make food not safe Air Traffic – disrupting navigation systems Remote bombing – placement of bombs to explode simultaneously Utilities disruption – knocking out service FBI Manufacturing – workers would notice increase in ingredients Air traffic – controllers and radar Utilities – alarmed services
  6. 5 http://www.directionsmag.com/articles/cyber-terrorism/123840 Probability of occurrence of cyber terrorism - graph The cost Direct Cost Implications Loss of sales during the disruption Staff time, network delays, intermittent access for business users Increased insurance costs due to litigation Loss of intellectual property - research, pricing, etc. Costs of forensics for recovery and litigation Loss of critical communications in time of emergency Indirect Cost Implications Loss of confidence and credibility in our financial systems Tarnished relationships& public image globally Strained business partner relationships - domestic and internationally Loss of future customer revenues for an individual or group of companies Loss of trust in the government and computer
  7. Dan Verton Vice President & Executive Editor www.itsecuritymagazine.com This slide represents the vulnerability of the united states to cyber terrorism and the areas of where attacks could take place. Utilities Banking Government Telco Transportation
  8. 1 – On line websters dictionary 2 – FBI
  9. 1 – On line websters dictionary 2 – FBI
  10. 1 – On line websters dictionary 2 – FBI
  11. 1 – On line websters dictionary 2 – FBI
  12. 1 – On line websters dictionary 2 – FBI
  13. III. Cyber Security Cyber threats to our national security are broad in nature, from acts of terrorism supported by the use of the Internet, to economic espionage by foreign countries, to sophisticated state- sponsored hackers. Such threats could compromise our national critical infrastructure, from energy, water, telecommunications and transportation systems to financial services. Cyber Threats With regard to the terrorist use of the Internet, terrorists have not used the Internet to launch a full-scale cyber attack. But terrorist sympathizers have used the Internet to hide their communications, attempted denial-of-service attacks, and defaced numerous websites. And while the damage may have been limited, such groups may attack for publicity or impact, and they are becoming more adept at both. The FBI, with our partners in the intelligence community, believes that the threat from the terrorist use of the Internet is a growing terrorist threat area. We speculate they will either train their own recruits or hire outsiders, with an eye toward leveraging physical attacks with use of the internet. The cyber threat is equally significant with regard to counterintelligence intrusions and economic espionage. Today, our adversaries sit within our networks, often unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target both government and corporate networks. They seek our technology and our trade secrets, our intelligence and our intellectual property, even our military weapons and strategies. The FBI is actively pursuing each of these threats. We have cyber squads in each of our 56 field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence. They share information with our law enforcement and intelligence partners, including the Secret Service, which also has strong capabilities in this area. And they teach their counterparts - both at home and abroad - how best to investigate cyber threats. But the FBI cannot do it alone. The National Cyber Investigative Joint Task Force includes 20 law enforcement and intelligence agencies, working side by side to share intelligence and to identify key players and schemes. The goal is to predict and prevent what is on the horizon, and to pursue the enterprises behind these attacks. Last year`s takedown of the Mariposa botnet is but one example of that collaboration. As you may know, Mariposa was an information- stealing botnet - one that infected millions of computers, including major banks and other Fortune 1000 companies. And this case, like so many others, emphasized the need for global cooperation. We look forward to working with Congress as it considers whether it should enact legislation requiring companies to report significant breaches of their network security to the FBI and other law enforcement agencies in real time. Such a requirement would promote coordination between appropriate agencies to investigate intrusions, identify the bad actors, and take actions to prevent further damage.
  14. 1 – On line Webster's dictionary 2 – FBI
  15. 1 – On line Webster's dictionary 2 – FBI
  16. 1 – On line Webster's dictionary 2 – FBI
  17. 1 – On line Webster's dictionary 2 – FBI