3. Cyberterrorism
The Bloodless War?
2 January 2012 CyberTerrorism/Ali Fahad
4. CyberTerrorism
Cyberterrorism is the use of Internet based
attacks in terrorist activities, including acts
of deliberate, large-scale disruption of
computer networks, especially of personal
computers attached to the Internet, by the
means of tools such as computer viruses,
hacking.
2 January 2012 CyberTerrorism/Ali Fahad
5. Strategies of Cyber
Terrorism
The basic elements are:
Hacking
Breaking into others system
Virus writing
Electronic snooping
Acquiring others private information
Old-fashioned human spying
Terrorist first must compromise private and
secure networks
2 January 2012 CyberTerrorism/Ali Fahad 5
6. Why Use Cyber Warfare?
Low barriers to entry – laptops cost a lot
less than tanks
Complex societies are dependent on
computers and networks
Online Banking and money storage
Companies stores data online
Different Countries
2 January 2012 CyberTerrorism/Ali Fahad 6
7. Forms of Cyber Terrorism
Bank Threatening
Personal Information Gain
Gaining Publicity
Assassination
Data Stealing
2 January 2012 CyberTerrorism/Ali Fahad 7
8. Commercial Sector a Key
Target
Communication systems
News organizations
Network suppliers
Corporations
Component suppliers (boots, food, radios, etc.)
Civilian consulting companies
Financial institutions
Government funds tied up in commercial banks
Healthcare industry
Pharmacies, hospitals, clinics
Drug companies (vaccines, antibiotics)
2 January 2012 CyberTerrorism/Ali Fahad 8
9. But Companies Not the Only
Targets
Power grids
For 11 days in Feb 2001, a development server at cal-
ISO electricity exchange was left connected to the
internet and was being quietly hacked
Personal Data
Terrorist hacks the computers and access personal data
for the their use.
2 January 2012 CyberTerrorism/Ali Fahad 9
10. Effects of CyberTerrorism
Harming effects on economy
Damages to websites
Cyberterrorism ranges from simple hacking
and computer viruses to causing of terror war
using computer
2 January 2012 CyberTerrorism/Ali Fahad 10
11. Cyber Terrorism in Pakistan
Many cases found in Pakistan during last decade.
Naeem Noor Khan, an alleged al-Qaeda operative
and computer expert, was arrested in Pakistan in
2004 and files found on his laptop contained
details of a plot to attack US financial buildings
and locations in Britain.
2 January 2012 CyberTerrorism/Ali Fahad 11
12. Steps By Pakistan
Pakistan government has taken serious step
to abandon cyberterrorism in Pakistan.
Federal Intelligence Agency
NR3C
(National Response Center for Cyber Crimes)
Electronic Transaction Ordinance 2002
Cyber Crime bill 2007
2 January 2012 CyberTerrorism/Ali Fahad 12
14. Pakistan sets death penalty for
cyber terrorism
Pakistan has taken the unprecedented step
of making cyber terrorism a crime
punishable by death, according to a decree
issued by President Asif Ali Zardari.
2 January 2012 CyberTerrorism/Ali Fahad 14
15. What Can We Do?
Go on the defensive now
Educate senior management on risks of cyberwarfare
Make information security a top priority
Enhance your security technology
Help government and security agencies
IT ISAC
PCF ( Pakistan Cyber Force)
NR3C
2 January 2012 CyberTerrorism/Ali Fahad 15