SlideShare a Scribd company logo
1 of 4
INFORAMTION ASSURANCES AND CYBER DEFENSE
                                       INTRODUCTION
It is not clear whether the Cyber-Terrorist is real or simply a theoretical class of adversary. Very
little intelligence or other data exist in open literature that characterizes the behavior or existence
of this class of adversary. We will argue that the Cyber-Terrorist is a very real potential threat to
modern information systems. Therefore, sophisticated defenders must understand the capabilities
and behavior of this adversary in order to defend against it. The Defense Advanced Research
Projects Agency‟s (DARPA‟s) Information Assurance (IA) Program is attempting .To
incorporate the Cyber-Terrorist Into a larger model of threats poised against information systems
operated by the US Department of Defense. This paper lists some of the basic assumptions about
this adversary, with the intent that these assumptions may be challenged within the research
community.
                                         HYPOTHESIS

Information systems that manage the nation‟s defenses and critical infrastructures are vulnerable
to cyber attacks.


                                 PROBLEM STATEMENT
             The problem of defending the nation from a cyber attack is complicated.
                               SIGNIFICANCE OF STUDY

The project is designed to develop conceptual and analytical understanding about the initiatives
that must be taken in order to secure the Cyber technology. This project helps me to understand
the objective to identify common threats and attacks employed against Web-accessible
applications. We analyze and explain the role of cryptography, and scrutinize issues related to
security management and network security.

                                      RESEARCH QUESTION



What is Cyber attack: Is your critical infrastructure is safe?
Is Anatomy of sophisticated IT is vulnerable to Cyber attack?
Is cyber attack is a threat not just to our national security, but also to our economic edge and way
of life?
Are Cyber-attacks on critical infrastructure representing a threat to both governments and the
private sector?
Should the National Guard and reserve members‟ role be expended to support cyberspace roles
and functions?




                                        LITERATURE REVIEW


In article (2009)“IATAC’s Critical Role in Information Assurance and Cyber
Security “by Gene Tyler, Dr. Ron Ritchey, and Karen Mercedes Goertzel
Authors analyzed the Measuring Cyber Security and Information Assurance which provides a
broad picture of the current stat e of cyber security and information assurance, as well as a
comprehensive look at the progress made in measurement discipline. The security of our nation
depends on the survivability, authenticity, and continuity of information systems. These systems
are vulnerable to external attacks, due in part to the necessary dependence on commercial
systems and the increased use of the Internet. Security of information systems is also of supreme
importance to the war fighter in defending our national security.
With the increasing amount of concern and Information Warfare (IW) activities requiring rapid
responses, it is difficult to ensure that all appropriate agencies and organizations are given the
knowledge and tools to protect from, react to, and defend against IW attacks. The Information
Assurance Technology Analysis Center (IATAC) is institution for facilitating the sharing of
Information Assurance (IA) and cyber security information throughout government, industry,
and academia so that individuals can gain access to knowledge and tools essential for effective
computer network defense.
In book “CYBER SECURITY ESSENTIALS” had written by Rick Howard, James J. Graham,
Richard Howard 15 dec, (2010). The book then essentially provides an „introduction‟ to the „subject‟
of Cyber Security. It covers the main concepts involved in identifying potential threats, vulnerabilities and
the procedures necessary to combat them, but does not provide a comprehensive, detailed description on
the subject of Cyber Security.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work.
Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts
behind prevalent threats, tactics, and procedures.


The subject content does provide an overview of current threats and trends, which, as outlined above, are
broken down and explained in simple terms, including the issue of program code exploits (reasonable
details provided on this). Diagrams are used well, enhancing the reader‟s understanding of the subject
matter and relevant references are provided where necessary.

Cyber Security, by its very nature, tends to be technical, and explaining technical concepts to the business
can often be challenging. This book aims to help in this area by removing the technical jargon as far as
possible and substituting these with simple terms to explain technical aspects. Does it work? Well,
almost; like many other complicated subjects where the author tries to make the topics accessible to the
layman, some of the important stuff gets lost in translation! To accomplish this, the team of security professionals from
VeriSign‟s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those
new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff.
Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations,
exploitation trends, malicious code techniques, and the latest threat vectors


            Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical
             understanding
            Supplies actionable advice for the mitigation of threats
            Breaks down the code used to write exploits into understandable diagrams


This book is not about the latest attack trends or botnets. It‟s about the reasons why these problems continue to plague us. By better understanding the logic
presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the
threats and attacks on the horizon




                                             RESEARCH METHODOLOGY
Researchers use secondary data for this research project by applying the methodology of
descriptive and analytical research. Data was collected from different websites, books, and
newspaper articles. Additional research was pursued utilizing college and university websites
that posted studies of similar matters. Furthermore, books written by experts were examined and
relevant information was extracted to reinforce the views within this text. A logical analysis of
the material was conducted and presented in this paper.


                                                              LIMITATIONS
      1. Being female researcher it was for researchers to go outside for searching data.
      2. Time span was very limited for dealing with such a complex and recent topic.
      3. Lack of good literature available in Fatima Jinnah Women University.
TENTATIVE OUTLINE/STRUCTURE OF STUDY

             CHAPTER 1



             CHAPTER 2



             CHAPTER 3



             CHAPTER 4

             CHAPTER 5




              CONCLUSION

More Related Content

What's hot

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat huntingVikas Jain
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePacificResearchPlatform
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...PacificResearchPlatform
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learningPadmaSelvaraj4
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...CSCJournals
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
Cyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCharles Li
 

What's hot (20)

Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
CV
CVCV
CV
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
Panel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in PracticePanel 3: Security and Privacy in Practice
Panel 3: Security and Privacy in Practice
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...Securing Research Data: A Workshop on Emerging Practices in Computation and S...
Securing Research Data: A Workshop on Emerging Practices in Computation and S...
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Scope of deep learning
Scope of deep learningScope of deep learning
Scope of deep learning
 
Deception towards Moving Target Defense
Deception towards Moving Target DefenseDeception towards Moving Target Defense
Deception towards Moving Target Defense
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Cyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive EraCyber Intelligence In the Cognitive Era
Cyber Intelligence In the Cognitive Era
 

Viewers also liked

T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.Madhav Vyas
 
2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applicationsudayudu
 
Evoluion of western diet chronic disease for cuny copy
Evoluion of western diet  chronic disease  for cuny copyEvoluion of western diet  chronic disease  for cuny copy
Evoluion of western diet chronic disease for cuny copynmaki
 
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho
 
03.04 power point
03.04 power point03.04 power point
03.04 power pointamyfwest
 

Viewers also liked (16)

T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.T.G.Mad Vyas ,life style of T.G.
T.G.Mad Vyas ,life style of T.G.
 
El slides
El slidesEl slides
El slides
 
How To Create Killer Recruiting Content
How To Create Killer Recruiting ContentHow To Create Killer Recruiting Content
How To Create Killer Recruiting Content
 
Emotions. For kids
Emotions. For kidsEmotions. For kids
Emotions. For kids
 
2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications2012 07 19_ste_mea_for_sap_applications
2012 07 19_ste_mea_for_sap_applications
 
Mis
MisMis
Mis
 
Sourcer's Daily Dozen - Glenn Gutmacher
Sourcer's Daily Dozen - Glenn GutmacherSourcer's Daily Dozen - Glenn Gutmacher
Sourcer's Daily Dozen - Glenn Gutmacher
 
Mimsism's 1 & 2
Mimsism's 1 & 2Mimsism's 1 & 2
Mimsism's 1 & 2
 
Coaching
CoachingCoaching
Coaching
 
skolskit
skolskitskolskit
skolskit
 
Evoluion of western diet chronic disease for cuny copy
Evoluion of western diet  chronic disease  for cuny copyEvoluion of western diet  chronic disease  for cuny copy
Evoluion of western diet chronic disease for cuny copy
 
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
Marcia Godinho - Portfolio Julho 2014 (Low Resolution)
 
Usb idazteko plantilla
Usb idazteko plantillaUsb idazteko plantilla
Usb idazteko plantilla
 
03.04 power point
03.04 power point03.04 power point
03.04 power point
 
Chủ đề 2
Chủ đề 2Chủ đề 2
Chủ đề 2
 
Pjk akhir tahun
Pjk akhir tahunPjk akhir tahun
Pjk akhir tahun
 

Similar to Cyber terrorism.. sir summar

Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...ssuser793b4e
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingIJNSA Journal
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingOluseyi Akindeinde
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Maurice Dawson
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmapAjay Ohri
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxbkbk37
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docxstudywriters
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceJacklynTsai
 

Similar to Cyber terrorism.. sir summar (20)

Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
A Study of Cyber Security Threats, Challenges in Different Fields and its Pro...
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
System Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats ModelingSystem Dynamics Based Insider Threats Modeling
System Dynamics Based Insider Threats Modeling
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_Modeling
 
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
Call for Chapters: Security Solutions for Hyperconnectivity and the Internet ...
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Case Cyber Security.docx
Case Cyber Security.docxCase Cyber Security.docx
Case Cyber Security.docx
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Internet Safety Essay.pdf
Internet Safety Essay.pdfInternet Safety Essay.pdf
Internet Safety Essay.pdf
 
CTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat IntelligenceCTI ANT: Hunting for Chinese Threat Intelligence
CTI ANT: Hunting for Chinese Threat Intelligence
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Cyber terrorism.. sir summar

  • 1. INFORAMTION ASSURANCES AND CYBER DEFENSE INTRODUCTION It is not clear whether the Cyber-Terrorist is real or simply a theoretical class of adversary. Very little intelligence or other data exist in open literature that characterizes the behavior or existence of this class of adversary. We will argue that the Cyber-Terrorist is a very real potential threat to modern information systems. Therefore, sophisticated defenders must understand the capabilities and behavior of this adversary in order to defend against it. The Defense Advanced Research Projects Agency‟s (DARPA‟s) Information Assurance (IA) Program is attempting .To incorporate the Cyber-Terrorist Into a larger model of threats poised against information systems operated by the US Department of Defense. This paper lists some of the basic assumptions about this adversary, with the intent that these assumptions may be challenged within the research community. HYPOTHESIS Information systems that manage the nation‟s defenses and critical infrastructures are vulnerable to cyber attacks. PROBLEM STATEMENT The problem of defending the nation from a cyber attack is complicated. SIGNIFICANCE OF STUDY The project is designed to develop conceptual and analytical understanding about the initiatives that must be taken in order to secure the Cyber technology. This project helps me to understand the objective to identify common threats and attacks employed against Web-accessible applications. We analyze and explain the role of cryptography, and scrutinize issues related to security management and network security. RESEARCH QUESTION What is Cyber attack: Is your critical infrastructure is safe?
  • 2. Is Anatomy of sophisticated IT is vulnerable to Cyber attack? Is cyber attack is a threat not just to our national security, but also to our economic edge and way of life? Are Cyber-attacks on critical infrastructure representing a threat to both governments and the private sector? Should the National Guard and reserve members‟ role be expended to support cyberspace roles and functions? LITERATURE REVIEW In article (2009)“IATAC’s Critical Role in Information Assurance and Cyber Security “by Gene Tyler, Dr. Ron Ritchey, and Karen Mercedes Goertzel Authors analyzed the Measuring Cyber Security and Information Assurance which provides a broad picture of the current stat e of cyber security and information assurance, as well as a comprehensive look at the progress made in measurement discipline. The security of our nation depends on the survivability, authenticity, and continuity of information systems. These systems are vulnerable to external attacks, due in part to the necessary dependence on commercial systems and the increased use of the Internet. Security of information systems is also of supreme importance to the war fighter in defending our national security. With the increasing amount of concern and Information Warfare (IW) activities requiring rapid responses, it is difficult to ensure that all appropriate agencies and organizations are given the knowledge and tools to protect from, react to, and defend against IW attacks. The Information Assurance Technology Analysis Center (IATAC) is institution for facilitating the sharing of Information Assurance (IA) and cyber security information throughout government, industry, and academia so that individuals can gain access to knowledge and tools essential for effective computer network defense. In book “CYBER SECURITY ESSENTIALS” had written by Rick Howard, James J. Graham, Richard Howard 15 dec, (2010). The book then essentially provides an „introduction‟ to the „subject‟ of Cyber Security. It covers the main concepts involved in identifying potential threats, vulnerabilities and the procedures necessary to combat them, but does not provide a comprehensive, detailed description on the subject of Cyber Security.
  • 3. The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. The subject content does provide an overview of current threats and trends, which, as outlined above, are broken down and explained in simple terms, including the issue of program code exploits (reasonable details provided on this). Diagrams are used well, enhancing the reader‟s understanding of the subject matter and relevant references are provided where necessary. Cyber Security, by its very nature, tends to be technical, and explaining technical concepts to the business can often be challenging. This book aims to help in this area by removing the technical jargon as far as possible and substituting these with simple terms to explain technical aspects. Does it work? Well, almost; like many other complicated subjects where the author tries to make the topics accessible to the layman, some of the important stuff gets lost in translation! To accomplish this, the team of security professionals from VeriSign‟s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‟s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon RESEARCH METHODOLOGY Researchers use secondary data for this research project by applying the methodology of descriptive and analytical research. Data was collected from different websites, books, and newspaper articles. Additional research was pursued utilizing college and university websites that posted studies of similar matters. Furthermore, books written by experts were examined and relevant information was extracted to reinforce the views within this text. A logical analysis of the material was conducted and presented in this paper. LIMITATIONS 1. Being female researcher it was for researchers to go outside for searching data. 2. Time span was very limited for dealing with such a complex and recent topic. 3. Lack of good literature available in Fatima Jinnah Women University.
  • 4. TENTATIVE OUTLINE/STRUCTURE OF STUDY CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 CONCLUSION