SlideShare a Scribd company logo
1 of 35
CYBER ATTACKS: The Next Frontier
[object Object]
 “Wars in the 21st century will increasingly require all elements of national power – not just the military.  They will require that economic, diplomatic, financial, law  enforcement and intelligence capabilities work together.”Ex-President: Mr. APJ Abdul Kalam
Discussion ,[object Object]
 Terrorist Internet Exploits
 Tactics and Strategy,[object Object]
Imagine Planning for These Contingencies ATM Failures Power Outages Parliament Attack Bridges Down Airliner Crash Mumbai City Oil Refinery Fire Telephone Outages Poisoned Water Supply ISPs All Offline Emergency Assistance (100/101) System Down Unrelated Events or Strategic Attack?
Using Our Systems Against Us ,[object Object]
 Mail distribution network – Anthrax
 Computers – next step ?,[object Object]
Real World Example – USA 2001 San Francisco FBI Field Office Investigation Internet probes from Saudi Arabia, Indonesia, Pakistan  Casings of web sites regarding emergency telephone systems, electrical generation and transmissions, water storage and distribution, nuclear power plants and gas facilities Exploring digital systems used to manage these systems
Why Cyber Attack on Critical Infrastructures? ,[object Object],Reduce our ability to protect its interests ,[object Object],Erode confidence in critical services and the government  ,[object Object],Damage economic systems ,[object Object],Physical damage/distraction efforts ,[object Object],Lack of attribution, low cost/high potential impact
How are we vulnerable? ,[object Object]
Anonymous access to infrastructures via the Internet and SCADA
Interdependencies of systems make attack consequences harder to predict and more severe
Malicious software is widely available and does not require a high degree of technical skill to use
More individuals with malicious intent on Internet
New cyber threats outpace defensive measures  ,[object Object]
Al-Qaeda Al-Qaeda laptop found in Afghanistan contained: ,[object Object]
Handbook – Internet tools, planning a hit, anti-surveillance methods, “cracking” tools
Al-Qaeda actively researched publicly                                 available information concerning critical    infrastructures posted on web sites,[object Object]
Terrorist Groups ,[object Object]
   Al-umar- Mujahideen
HizbulMujahideen
Harkat-ul- Mujahideen
   Indian Mujahideen
Jaish-e-Mahommad
Jamat-ul- Mujahideen
Laskar-e-Toiba,[object Object]
Terrorists ,[object Object]
In the future, cyber terrorism may become a viable option to traditional physical acts of violence due to:Perceived anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are needed
Terrorist Use of the Internet ,[object Object]
 Cyber Facilitated Terrorism
 Cyber terrorism,[object Object]

More Related Content

What's hot

Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptSHAHID ANSARI
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 

What's hot (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineering Social engineering
Social engineering
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Viewers also liked

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
The Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber TerrorismThe Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber TerrorismGavin Hall
 
Pitch presentation cyber terrorism
Pitch presentation cyber terrorism Pitch presentation cyber terrorism
Pitch presentation cyber terrorism Harryyoung1
 
Currentissuesoncyberterrorpresentation
Currentissuesoncyberterrorpresentation Currentissuesoncyberterrorpresentation
Currentissuesoncyberterrorpresentation Brian_Andre
 
Future of Cyber Terrorism
Future of Cyber TerrorismFuture of Cyber Terrorism
Future of Cyber TerrorismMaurice Dawson
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clauseAvinash Tegginmani
 

Viewers also liked (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
The Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber TerrorismThe Importance of Cyber in Cyber Terrorism
The Importance of Cyber in Cyber Terrorism
 
Pitch presentation cyber terrorism
Pitch presentation cyber terrorism Pitch presentation cyber terrorism
Pitch presentation cyber terrorism
 
Currentissuesoncyberterrorpresentation
Currentissuesoncyberterrorpresentation Currentissuesoncyberterrorpresentation
Currentissuesoncyberterrorpresentation
 
Future of Cyber Terrorism
Future of Cyber TerrorismFuture of Cyber Terrorism
Future of Cyber Terrorism
 
Cyber crime in details with sections and clause
Cyber crime in details with sections and clauseCyber crime in details with sections and clause
Cyber crime in details with sections and clause
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Similar to Cyber Terrorism

Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismawderdlfy
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxothmanomar13
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 

Similar to Cyber Terrorism (20)

28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
C018131821
C018131821C018131821
C018131821
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 

More from Deepak Pareek

Digitalization of Agriculture
Digitalization of AgricultureDigitalization of Agriculture
Digitalization of AgricultureDeepak Pareek
 
Digitization to enable trust, transparency and traceability for better compli...
Digitization to enable trust, transparency and traceability for better compli...Digitization to enable trust, transparency and traceability for better compli...
Digitization to enable trust, transparency and traceability for better compli...Deepak Pareek
 
PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES
 PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES
PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSESDeepak Pareek
 
Demystify Agribusiness - Partnering to Succeed, Scaling Up through Collaboration
Demystify Agribusiness - Partnering to Succeed, Scaling Up through CollaborationDemystify Agribusiness - Partnering to Succeed, Scaling Up through Collaboration
Demystify Agribusiness - Partnering to Succeed, Scaling Up through CollaborationDeepak Pareek
 
5G: The Catalyst to Digital Revolution in India
5G: The Catalyst to Digital Revolution in India5G: The Catalyst to Digital Revolution in India
5G: The Catalyst to Digital Revolution in IndiaDeepak Pareek
 
Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...
Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...
Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...Deepak Pareek
 
Food 4.0: Data Driven Agri-Food Systems
Food 4.0: Data Driven Agri-Food SystemsFood 4.0: Data Driven Agri-Food Systems
Food 4.0: Data Driven Agri-Food SystemsDeepak Pareek
 
#AgriTechIndia - Current Scenario of Agri & Food Startups
#AgriTechIndia - Current Scenario of Agri & Food Startups#AgriTechIndia - Current Scenario of Agri & Food Startups
#AgriTechIndia - Current Scenario of Agri & Food StartupsDeepak Pareek
 
Agri-Technopreneurs Align for Success - Lessons Learned & Unlearned
Agri-Technopreneurs Align for Success - Lessons Learned & UnlearnedAgri-Technopreneurs Align for Success - Lessons Learned & Unlearned
Agri-Technopreneurs Align for Success - Lessons Learned & UnlearnedDeepak Pareek
 
A Sustainable Palm Oil Platform - Technology to Empower Farmers
A Sustainable Palm Oil Platform - Technology to Empower FarmersA Sustainable Palm Oil Platform - Technology to Empower Farmers
A Sustainable Palm Oil Platform - Technology to Empower FarmersDeepak Pareek
 
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...Deepak Pareek
 
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...Deepak Pareek
 
BE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEUR
BE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEURBE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEUR
BE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEURDeepak Pareek
 
THE INNOVATION & TECHNOLOGY
THE INNOVATION & TECHNOLOGYTHE INNOVATION & TECHNOLOGY
THE INNOVATION & TECHNOLOGYDeepak Pareek
 
The vibrant startup challenge - HnyB Technologies Limited
The vibrant startup challenge - HnyB Technologies LimitedThe vibrant startup challenge - HnyB Technologies Limited
The vibrant startup challenge - HnyB Technologies LimitedDeepak Pareek
 
Helping Students discover & Learn - Business & Management
Helping Students discover & Learn - Business & ManagementHelping Students discover & Learn - Business & Management
Helping Students discover & Learn - Business & ManagementDeepak Pareek
 
Market Intelligence Solution, Knowledge Partnership
Market Intelligence Solution, Knowledge PartnershipMarket Intelligence Solution, Knowledge Partnership
Market Intelligence Solution, Knowledge PartnershipDeepak Pareek
 
I believe in the power of words - Deepak Pareek, Author Profile
I believe in the power of words - Deepak Pareek, Author ProfileI believe in the power of words - Deepak Pareek, Author Profile
I believe in the power of words - Deepak Pareek, Author ProfileDeepak Pareek
 
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...Deepak Pareek
 
Swarnim Gujarat - Social Media as Bridge between CM (Common Man) & CM (Chief...
Swarnim Gujarat - Social Media as Bridge between  CM (Common Man) & CM (Chief...Swarnim Gujarat - Social Media as Bridge between  CM (Common Man) & CM (Chief...
Swarnim Gujarat - Social Media as Bridge between CM (Common Man) & CM (Chief...Deepak Pareek
 

More from Deepak Pareek (20)

Digitalization of Agriculture
Digitalization of AgricultureDigitalization of Agriculture
Digitalization of Agriculture
 
Digitization to enable trust, transparency and traceability for better compli...
Digitization to enable trust, transparency and traceability for better compli...Digitization to enable trust, transparency and traceability for better compli...
Digitization to enable trust, transparency and traceability for better compli...
 
PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES
 PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES
PUTTING THE USER BACK IN USER EXPERIENCE – DESIGNING FOR RURAL MASSES
 
Demystify Agribusiness - Partnering to Succeed, Scaling Up through Collaboration
Demystify Agribusiness - Partnering to Succeed, Scaling Up through CollaborationDemystify Agribusiness - Partnering to Succeed, Scaling Up through Collaboration
Demystify Agribusiness - Partnering to Succeed, Scaling Up through Collaboration
 
5G: The Catalyst to Digital Revolution in India
5G: The Catalyst to Digital Revolution in India5G: The Catalyst to Digital Revolution in India
5G: The Catalyst to Digital Revolution in India
 
Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...
Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...
Farm Mechanisation :AgriInformatics (AI/IoT/Blockchain), Autonomous Farming V...
 
Food 4.0: Data Driven Agri-Food Systems
Food 4.0: Data Driven Agri-Food SystemsFood 4.0: Data Driven Agri-Food Systems
Food 4.0: Data Driven Agri-Food Systems
 
#AgriTechIndia - Current Scenario of Agri & Food Startups
#AgriTechIndia - Current Scenario of Agri & Food Startups#AgriTechIndia - Current Scenario of Agri & Food Startups
#AgriTechIndia - Current Scenario of Agri & Food Startups
 
Agri-Technopreneurs Align for Success - Lessons Learned & Unlearned
Agri-Technopreneurs Align for Success - Lessons Learned & UnlearnedAgri-Technopreneurs Align for Success - Lessons Learned & Unlearned
Agri-Technopreneurs Align for Success - Lessons Learned & Unlearned
 
A Sustainable Palm Oil Platform - Technology to Empower Farmers
A Sustainable Palm Oil Platform - Technology to Empower FarmersA Sustainable Palm Oil Platform - Technology to Empower Farmers
A Sustainable Palm Oil Platform - Technology to Empower Farmers
 
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...
ARTIFICIAL INTELLIGENCE, BLOCK CHAIN AND BIG DATA - EMERGING TECHNOLOGIES AND...
 
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...
MyCrop - Platform Vision For Sustainable Agriculture, Farmer Empowerment By O...
 
BE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEUR
BE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEURBE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEUR
BE AN AWESOME HUMAN BEING & AN EXTRAORDINARY TECHNOPRENEUR
 
THE INNOVATION & TECHNOLOGY
THE INNOVATION & TECHNOLOGYTHE INNOVATION & TECHNOLOGY
THE INNOVATION & TECHNOLOGY
 
The vibrant startup challenge - HnyB Technologies Limited
The vibrant startup challenge - HnyB Technologies LimitedThe vibrant startup challenge - HnyB Technologies Limited
The vibrant startup challenge - HnyB Technologies Limited
 
Helping Students discover & Learn - Business & Management
Helping Students discover & Learn - Business & ManagementHelping Students discover & Learn - Business & Management
Helping Students discover & Learn - Business & Management
 
Market Intelligence Solution, Knowledge Partnership
Market Intelligence Solution, Knowledge PartnershipMarket Intelligence Solution, Knowledge Partnership
Market Intelligence Solution, Knowledge Partnership
 
I believe in the power of words - Deepak Pareek, Author Profile
I believe in the power of words - Deepak Pareek, Author ProfileI believe in the power of words - Deepak Pareek, Author Profile
I believe in the power of words - Deepak Pareek, Author Profile
 
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...
Shift Happens - It is Happening Now Make it Rewarding, Evolving Telecommunica...
 
Swarnim Gujarat - Social Media as Bridge between CM (Common Man) & CM (Chief...
Swarnim Gujarat - Social Media as Bridge between  CM (Common Man) & CM (Chief...Swarnim Gujarat - Social Media as Bridge between  CM (Common Man) & CM (Chief...
Swarnim Gujarat - Social Media as Bridge between CM (Common Man) & CM (Chief...
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Cyber Terrorism

  • 1. CYBER ATTACKS: The Next Frontier
  • 2.
  • 3. “Wars in the 21st century will increasingly require all elements of national power – not just the military. They will require that economic, diplomatic, financial, law enforcement and intelligence capabilities work together.”Ex-President: Mr. APJ Abdul Kalam
  • 4.
  • 6.
  • 7.
  • 8. Imagine Planning for These Contingencies ATM Failures Power Outages Parliament Attack Bridges Down Airliner Crash Mumbai City Oil Refinery Fire Telephone Outages Poisoned Water Supply ISPs All Offline Emergency Assistance (100/101) System Down Unrelated Events or Strategic Attack?
  • 9.
  • 10. Mail distribution network – Anthrax
  • 11.
  • 12. Real World Example – USA 2001 San Francisco FBI Field Office Investigation Internet probes from Saudi Arabia, Indonesia, Pakistan Casings of web sites regarding emergency telephone systems, electrical generation and transmissions, water storage and distribution, nuclear power plants and gas facilities Exploring digital systems used to manage these systems
  • 13.
  • 14.
  • 15. Anonymous access to infrastructures via the Internet and SCADA
  • 16. Interdependencies of systems make attack consequences harder to predict and more severe
  • 17. Malicious software is widely available and does not require a high degree of technical skill to use
  • 18. More individuals with malicious intent on Internet
  • 19.
  • 20.
  • 21. Handbook – Internet tools, planning a hit, anti-surveillance methods, “cracking” tools
  • 22.
  • 23.
  • 24. Al-umar- Mujahideen
  • 27. Indian Mujahideen
  • 30.
  • 31.
  • 32. In the future, cyber terrorism may become a viable option to traditional physical acts of violence due to:Perceived anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are needed
  • 33.
  • 35.
  • 36.
  • 37.
  • 38. Hacktivism Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example:ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.
  • 39. Smithsonian Mental Institution Hacktivism Electronic Disturbance Theater
  • 40.
  • 41.
  • 42. Web sites also contain information necessary to construct weapons, obtain false identification
  • 43. Use Internet as a communications tool via chat rooms, BBS, email
  • 44.
  • 45. KamelDaoudi – Believed to be Al-Qaeda Cyber Terrorist. Arrested for alleged involvement in plot to bomb American Embassy in Paris
  • 46. Cyberterrorism Cyberterrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.
  • 47. THE CYBERTERRORIST THREAT Assessing the Threat Behavioral Profile Technical Feasibility THREAT Operational Practicality
  • 48. Availability of Capability Precision Guided Munitions Cruise Missile Invasion Computer Strategic Nuclear Weapons Missiles ICBM & SLBM Cost & Means of Attack Cost of Capability 1955 1960 1970 1975 1985 1945 Today
  • 49. Tactics and Strategy Prevention and cooperation
  • 50.
  • 51. Recruitment of engineers and computer scientists – critical skills
  • 52. Increasing agents dedicated to cyber crime
  • 53.
  • 61. Look – on the Internet
  • 62.
  • 63. Therefore, there exists a “target rich environment” for those who would do harm via the Internet
  • 64.