SlideShare une entreprise Scribd logo
1  sur  15
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
JENI VARGHESE
PATENT DEPT.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
• The term ‘cyber terrorism’ was coined in 1996 by
Barry Collin.
• Cyber terrorism - “convergence of cyberspace and
terrorism”.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
• US national infrastructure protection centre
(2001) has defined cyber terrorism as:
“A criminal act perpetrated by the use of computers
and telecommunications capabilities, resulting in
violence, destruction and/or disruption of services,
where the intended purpose is to create fear by causing
confusion and uncertainty within a given population,
with the goal of influencing a government or
population to conform to a particular political, social
or ideological agenda.”
• Use of computers, internet and information
gateways to support traditional terrorism.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
• Targets may include power plants, military
installations, the banking industry, air traffic control
centers, water systems, and other major centers
affecting the lives and well-being of many people and
companies.
•
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
FEATURES OF CYBER
TERRORISM
• Difficulty Identifying Attackers: It remains difficult to
determine the identity of the initiators of most cyber attacks.
• Lack of Boundaries: Attacks can originate from anywhere in
the world and from multiple locations simultaneously.
• Speed of Development: The time between the discovery of a
new vulnerability and the emergence of a new tool or
technique that exploits the vulnerability is getting shorter.
• Low Cost of Tools: The technology employed in attacks is
simple to use, inexpensive, and widely available.
• Automated Methods: The methods of attack have become
automated and more sophisticated, resulting in greater
damage from a single attack.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
FORMS OF CYBER
TERRORISM
Some of the forms of cyber terrorism are:
(a) Privacy violation.
(b) Secret information appropriation and data
theft.
(c) Demolition of e-governance base.
(d) Distributed Denial of Services (DoS) attack.
(e) Network damage and disruptions.
(f) Use of cyber communications for terrorism.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
METHODS OF ATTACK
Three methods of attack: involves different types
of weapons
(a) Physical Attack:
•against computer facilities and/or transmission lines.
•accomplished by use of conventional weapons to destroy or seriously
injure computers and their terminals.
(b) Electronic Attack:
•use of power of electromagnetic energy or electromagnetic pulse to
overload computer circuitry.
(c) Cyber Attack or Computer Network Attack:
•use of a malicious code to take advantage of software's weakness; or
•an attacker uses stolen information to enter restricted computer systems.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
TOOLS FOR CYBER
TERRORISM
Some of the tools used by cyber terrorists to
disseminate their agenda are:-
(a)Virus: A computer program that can replicate
itself and spread from one computer to another.
(b)Worm: a standalone computer program that
replicates itself in order to spread to other
computers.
(c) Trojan Horse: A non-self-replicating type of
malware which facilitates unauthorized access to
the users computer system.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
TOOLS FOR CYBER
TERRORISM
(d) Logic Bomb: A piece of code intentionally
inserted into a software system that will set
off a malicious function when specified
conditions are met.
(e)Trap Doors: A method of gaining access to
some part of a system other than by the
normal procedure.
(f)Denial of Service: The attacker sends almost
innumerable requests for information/e-mail
that cause a computer systems to crash.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
TOOLS FOR CYBER
TERRORISM
(g) Use of Cryptography and
Steganography: to aid terrorism
Cryptography: Information is transformed into
unreadable format (cipher text). Only those
who possess a secret key can decipher (or
decrypt) the message into plain text.
Steganography: Writing hidden messages in a
way that no one, apart from the sender and
intended recipient, suspects the existence of
the message.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
INCIDENCE OF CYBER
TERRORISM
Al Qaeda Terrorist used the Internet to plan the September11,
2001 operations upon new York City and Washington D.C.
They used a special internet chat software for communication.
A nuclear power plant in Iran was attacked by the Stuxnet
worm. The worm installed itself in the plant’s
PLC (Programming Logic Controller)
computer-controlled system and caused a
change in the rotational speed of machinery.
The increased speed without the usual
automated shut-down controls caused the
nuclear plant fusion center to spin
uncontrollably and explode.
20102010
20012001
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
ACTS OF CYBER
TERRORISM IN INDIA
• In the case of 26/11 Mumbai attacks, terrorists used
cyber communication to aide the terrorists to carry on
with the massacre.
• Cyber communication was also used in July 2011
Jhaveri Bazaar Mumbai bomb blasts and 2010
Varanasi blasts.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
INDIA : FEW INITIATIVES
The Government of India has put in place some
mechanisms to counter the threat of cyber terrorism.
• Indian Computer Emergency Response Team (CERT-
In): a functional organization of the department of
Information Technology with the objective of
securing Indian cyber space.
• National Cyber Security Assurance Framework is
established by the CERT-In for protection of Critical
Information.
• The Information Technology Act, 2000 and IT
(Amendment) Act 2008.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
THE INFORMATION TECHNOLOGY ACT,
2000 AND IT ACT AMENDMENT 2008.
• Amendments under the Information Technology Act,
2000 has defined the term “Cyber terrorism” U/Sec.
66F (1).
• Punishment for Cyber terrorism
Whoever commits or conspires to commit cyber terrorism shall be
punishable with imprisonment which may extend to
imprisonment for life. (Section 66F (2))
• Section 69 gives power to the state to issue directions
for interception or monitoring or decryption of any
information through any computer source.
• Section 70 A and 70 B- Agency for critical
information and Indian Computer Emergency response
team (CERT-In) for incident response.
CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
THANK YOU

Contenu connexe

Tendances

Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 

Tendances (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 

En vedette

Thinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsThinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsGianluca Stringhini
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorismkelvingg
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Aare Puussaar
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksgo2project
 
Traking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication networkTraking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication networkKrishna Ghanva
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksrahul_2013
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksPRADEEP Cheekatla
 
Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksTracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksAmal Mohan
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksSravankumar Samboju
 

En vedette (12)

Thinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsThinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal Operations
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)Mobiilne positsioneerimine (Mobile Positioning)
Mobiilne positsioneerimine (Mobile Positioning)
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Traking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication networkTraking And positioning of mobile in telecomunication network
Traking And positioning of mobile in telecomunication network
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 
Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networksTracking and-positioning-of-mobile-systems-in-telecommunication-networks
Tracking and-positioning-of-mobile-systems-in-telecommunication-networks
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Tracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networksTracking and positioning of mobile systems in telecommunication networks
Tracking and positioning of mobile systems in telecommunication networks
 

Similaire à Cyber terrorism

Copyright issues in digital media
Copyright issues in digital mediaCopyright issues in digital media
Copyright issues in digital mediaAltacit Global
 
Cyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in IndiaCyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in IndiaAltacit Global
 
An analysis of apple’s patent to block recording
An analysis of apple’s patent to block recordingAn analysis of apple’s patent to block recording
An analysis of apple’s patent to block recordingAltacit Global
 
Iprandcompetitionlaws 131123062348-phpapp01
Iprandcompetitionlaws 131123062348-phpapp01Iprandcompetitionlaws 131123062348-phpapp01
Iprandcompetitionlaws 131123062348-phpapp01AnjaliGupta437
 
National building code
National building codeNational building code
National building codeAltacit Global
 
Ip issues in digital libraries
Ip issues in digital librariesIp issues in digital libraries
Ip issues in digital librariesAltacit Global
 
Ipr and competition laws
Ipr and competition lawsIpr and competition laws
Ipr and competition lawsAltacit Global
 
Legal issues in driverless car
Legal issues in driverless carLegal issues in driverless car
Legal issues in driverless carAltacit Global
 
Ericsson vs intex an overview of software patenting
Ericsson vs intex an overview of software patentingEricsson vs intex an overview of software patenting
Ericsson vs intex an overview of software patentingAltacit Global
 
Patents and bioinformatics
Patents and bioinformaticsPatents and bioinformatics
Patents and bioinformaticsAltacit Global
 
Prominence of ethical hacking in cyber crimes
Prominence of ethical hacking in cyber crimesProminence of ethical hacking in cyber crimes
Prominence of ethical hacking in cyber crimesAltacit Global
 
Non patentable inventions
Non patentable inventionsNon patentable inventions
Non patentable inventionsAltacit Global
 
Business method patents
Business method patentsBusiness method patents
Business method patentsAltacit Global
 

Similaire à Cyber terrorism (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Copyright issues in digital media
Copyright issues in digital mediaCopyright issues in digital media
Copyright issues in digital media
 
Cyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in IndiaCyber hacking and cyber crimes in India
Cyber hacking and cyber crimes in India
 
An analysis of apple’s patent to block recording
An analysis of apple’s patent to block recordingAn analysis of apple’s patent to block recording
An analysis of apple’s patent to block recording
 
Iprandcompetitionlaws 131123062348-phpapp01
Iprandcompetitionlaws 131123062348-phpapp01Iprandcompetitionlaws 131123062348-phpapp01
Iprandcompetitionlaws 131123062348-phpapp01
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
National building code
National building codeNational building code
National building code
 
E waste managment
E waste managmentE waste managment
E waste managment
 
Ip issues in digital libraries
Ip issues in digital librariesIp issues in digital libraries
Ip issues in digital libraries
 
Ipr and competition laws
Ipr and competition lawsIpr and competition laws
Ipr and competition laws
 
Legal issues in driverless car
Legal issues in driverless carLegal issues in driverless car
Legal issues in driverless car
 
Ericsson vs intex an overview of software patenting
Ericsson vs intex an overview of software patentingEricsson vs intex an overview of software patenting
Ericsson vs intex an overview of software patenting
 
Dmca
DmcaDmca
Dmca
 
Ip risk management
Ip risk managementIp risk management
Ip risk management
 
Ipr and software
Ipr and softwareIpr and software
Ipr and software
 
Patents and bioinformatics
Patents and bioinformaticsPatents and bioinformatics
Patents and bioinformatics
 
Prominence of ethical hacking in cyber crimes
Prominence of ethical hacking in cyber crimesProminence of ethical hacking in cyber crimes
Prominence of ethical hacking in cyber crimes
 
Non patentable inventions
Non patentable inventionsNon patentable inventions
Non patentable inventions
 
Business method patents
Business method patentsBusiness method patents
Business method patents
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 

Plus de Altacit Global

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Altacit Global
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from homeAltacit Global
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Altacit Global
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection actAltacit Global
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn childAltacit Global
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in IndiaAltacit Global
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-IndiaAltacit Global
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Altacit Global
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemAltacit Global
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companiesAltacit Global
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyrightAltacit Global
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in IndiaAltacit Global
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in IndiaAltacit Global
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development BoardAltacit Global
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Altacit Global
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Altacit Global
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in IndiaAltacit Global
 

Plus de Altacit Global (20)

Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020Unmanned aircraft system rules, 2020
Unmanned aircraft system rules, 2020
 
Sexual harassment during work from home
Sexual harassment during work from homeSexual harassment during work from home
Sexual harassment during work from home
 
Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...Information technology guidelines for intermediaries and digital media ethics...
Information technology guidelines for intermediaries and digital media ethics...
 
Returns and refunds consumer protection act
Returns and refunds  consumer protection actReturns and refunds  consumer protection act
Returns and refunds consumer protection act
 
Rights of an unborn child
Rights of an unborn childRights of an unborn child
Rights of an unborn child
 
Grounds for divorce in India
Grounds for divorce in IndiaGrounds for divorce in India
Grounds for divorce in India
 
Alimony laws in India
Alimony laws in IndiaAlimony laws in India
Alimony laws in India
 
Patent licensing
Patent licensingPatent licensing
Patent licensing
 
Surrogacy laws-in-India
Surrogacy laws-in-IndiaSurrogacy laws-in-India
Surrogacy laws-in-India
 
I r s form w-9
I r s form w-9I r s form w-9
I r s form w-9
 
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
Tamilnadu regulation of rights and responsibilities of landlords and tenants ...
 
Requirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft systemRequirements for operation of civil remotely piloted aircraft system
Requirements for operation of civil remotely piloted aircraft system
 
Rights of employees under insolvent companies
Rights of employees under insolvent companiesRights of employees under insolvent companies
Rights of employees under insolvent companies
 
Doctrine of originality copyright
Doctrine of originality copyrightDoctrine of originality copyright
Doctrine of originality copyright
 
Restoration of lapsed patents in India
Restoration of lapsed patents in IndiaRestoration of lapsed patents in India
Restoration of lapsed patents in India
 
Celebrity rights in India
Celebrity rights in IndiaCelebrity rights in India
Celebrity rights in India
 
Technology Development Board
Technology Development BoardTechnology Development Board
Technology Development Board
 
Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)Motor accident mediation authority (MAMA)
Motor accident mediation authority (MAMA)
 
Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015Sebi (prohibition of insider trading) regulations, 2015
Sebi (prohibition of insider trading) regulations, 2015
 
Legality of cryptocurrency in India
Legality of cryptocurrency in IndiaLegality of cryptocurrency in India
Legality of cryptocurrency in India
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Cyber terrorism

  • 1. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com CYBER TERRORISM JENI VARGHESE PATENT DEPT.
  • 2. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com CYBER TERRORISM • The term ‘cyber terrorism’ was coined in 1996 by Barry Collin. • Cyber terrorism - “convergence of cyberspace and terrorism”.
  • 3. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com CYBER TERRORISM • US national infrastructure protection centre (2001) has defined cyber terrorism as: “A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services, where the intended purpose is to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social or ideological agenda.” • Use of computers, internet and information gateways to support traditional terrorism.
  • 4. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com CYBER TERRORISM • Targets may include power plants, military installations, the banking industry, air traffic control centers, water systems, and other major centers affecting the lives and well-being of many people and companies. •
  • 5. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com FEATURES OF CYBER TERRORISM • Difficulty Identifying Attackers: It remains difficult to determine the identity of the initiators of most cyber attacks. • Lack of Boundaries: Attacks can originate from anywhere in the world and from multiple locations simultaneously. • Speed of Development: The time between the discovery of a new vulnerability and the emergence of a new tool or technique that exploits the vulnerability is getting shorter. • Low Cost of Tools: The technology employed in attacks is simple to use, inexpensive, and widely available. • Automated Methods: The methods of attack have become automated and more sophisticated, resulting in greater damage from a single attack.
  • 6. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com FORMS OF CYBER TERRORISM Some of the forms of cyber terrorism are: (a) Privacy violation. (b) Secret information appropriation and data theft. (c) Demolition of e-governance base. (d) Distributed Denial of Services (DoS) attack. (e) Network damage and disruptions. (f) Use of cyber communications for terrorism.
  • 7. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com METHODS OF ATTACK Three methods of attack: involves different types of weapons (a) Physical Attack: •against computer facilities and/or transmission lines. •accomplished by use of conventional weapons to destroy or seriously injure computers and their terminals. (b) Electronic Attack: •use of power of electromagnetic energy or electromagnetic pulse to overload computer circuitry. (c) Cyber Attack or Computer Network Attack: •use of a malicious code to take advantage of software's weakness; or •an attacker uses stolen information to enter restricted computer systems.
  • 8. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com TOOLS FOR CYBER TERRORISM Some of the tools used by cyber terrorists to disseminate their agenda are:- (a)Virus: A computer program that can replicate itself and spread from one computer to another. (b)Worm: a standalone computer program that replicates itself in order to spread to other computers. (c) Trojan Horse: A non-self-replicating type of malware which facilitates unauthorized access to the users computer system.
  • 9. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com TOOLS FOR CYBER TERRORISM (d) Logic Bomb: A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. (e)Trap Doors: A method of gaining access to some part of a system other than by the normal procedure. (f)Denial of Service: The attacker sends almost innumerable requests for information/e-mail that cause a computer systems to crash.
  • 10. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com TOOLS FOR CYBER TERRORISM (g) Use of Cryptography and Steganography: to aid terrorism Cryptography: Information is transformed into unreadable format (cipher text). Only those who possess a secret key can decipher (or decrypt) the message into plain text. Steganography: Writing hidden messages in a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
  • 11. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com INCIDENCE OF CYBER TERRORISM Al Qaeda Terrorist used the Internet to plan the September11, 2001 operations upon new York City and Washington D.C. They used a special internet chat software for communication. A nuclear power plant in Iran was attacked by the Stuxnet worm. The worm installed itself in the plant’s PLC (Programming Logic Controller) computer-controlled system and caused a change in the rotational speed of machinery. The increased speed without the usual automated shut-down controls caused the nuclear plant fusion center to spin uncontrollably and explode. 20102010 20012001
  • 12. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com ACTS OF CYBER TERRORISM IN INDIA • In the case of 26/11 Mumbai attacks, terrorists used cyber communication to aide the terrorists to carry on with the massacre. • Cyber communication was also used in July 2011 Jhaveri Bazaar Mumbai bomb blasts and 2010 Varanasi blasts.
  • 13. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com INDIA : FEW INITIATIVES The Government of India has put in place some mechanisms to counter the threat of cyber terrorism. • Indian Computer Emergency Response Team (CERT- In): a functional organization of the department of Information Technology with the objective of securing Indian cyber space. • National Cyber Security Assurance Framework is established by the CERT-In for protection of Critical Information. • The Information Technology Act, 2000 and IT (Amendment) Act 2008.
  • 14. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com THE INFORMATION TECHNOLOGY ACT, 2000 AND IT ACT AMENDMENT 2008. • Amendments under the Information Technology Act, 2000 has defined the term “Cyber terrorism” U/Sec. 66F (1). • Punishment for Cyber terrorism Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. (Section 66F (2)) • Section 69 gives power to the state to issue directions for interception or monitoring or decryption of any information through any computer source. • Section 70 A and 70 B- Agency for critical information and Indian Computer Emergency response team (CERT-In) for incident response.
  • 15. CHENNAI 3rd Floor, ‘Creative Enclave’, 148-150, Luz Church Road, Mylapore, Chennai - 600 004. Tel: +91 - 44 - 2498 4821 BANGALORE Suite 920, Level 9, Raheja Towers, 26-27, M G Road, Bangalore - 560 001. Tel: +91 - 80 - 6546 2400 COIMBATORE BB1, Park Avenue, # 48, Race Course Road, Coimbatore - 641018. Tel: +91 - 422 – 6552921 EMAIL info@altacit.com WEBSITE www.altacit.com THANK YOU