2. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
• The term ‘cyber terrorism’ was coined in 1996 by
Barry Collin.
• Cyber terrorism - “convergence of cyberspace and
terrorism”.
3. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
• US national infrastructure protection centre
(2001) has defined cyber terrorism as:
“A criminal act perpetrated by the use of computers
and telecommunications capabilities, resulting in
violence, destruction and/or disruption of services,
where the intended purpose is to create fear by causing
confusion and uncertainty within a given population,
with the goal of influencing a government or
population to conform to a particular political, social
or ideological agenda.”
• Use of computers, internet and information
gateways to support traditional terrorism.
4. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
CYBER TERRORISM
• Targets may include power plants, military
installations, the banking industry, air traffic control
centers, water systems, and other major centers
affecting the lives and well-being of many people and
companies.
•
5. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
FEATURES OF CYBER
TERRORISM
• Difficulty Identifying Attackers: It remains difficult to
determine the identity of the initiators of most cyber attacks.
• Lack of Boundaries: Attacks can originate from anywhere in
the world and from multiple locations simultaneously.
• Speed of Development: The time between the discovery of a
new vulnerability and the emergence of a new tool or
technique that exploits the vulnerability is getting shorter.
• Low Cost of Tools: The technology employed in attacks is
simple to use, inexpensive, and widely available.
• Automated Methods: The methods of attack have become
automated and more sophisticated, resulting in greater
damage from a single attack.
6. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
FORMS OF CYBER
TERRORISM
Some of the forms of cyber terrorism are:
(a) Privacy violation.
(b) Secret information appropriation and data
theft.
(c) Demolition of e-governance base.
(d) Distributed Denial of Services (DoS) attack.
(e) Network damage and disruptions.
(f) Use of cyber communications for terrorism.
7. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
METHODS OF ATTACK
Three methods of attack: involves different types
of weapons
(a) Physical Attack:
•against computer facilities and/or transmission lines.
•accomplished by use of conventional weapons to destroy or seriously
injure computers and their terminals.
(b) Electronic Attack:
•use of power of electromagnetic energy or electromagnetic pulse to
overload computer circuitry.
(c) Cyber Attack or Computer Network Attack:
•use of a malicious code to take advantage of software's weakness; or
•an attacker uses stolen information to enter restricted computer systems.
8. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
TOOLS FOR CYBER
TERRORISM
Some of the tools used by cyber terrorists to
disseminate their agenda are:-
(a)Virus: A computer program that can replicate
itself and spread from one computer to another.
(b)Worm: a standalone computer program that
replicates itself in order to spread to other
computers.
(c) Trojan Horse: A non-self-replicating type of
malware which facilitates unauthorized access to
the users computer system.
9. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
TOOLS FOR CYBER
TERRORISM
(d) Logic Bomb: A piece of code intentionally
inserted into a software system that will set
off a malicious function when specified
conditions are met.
(e)Trap Doors: A method of gaining access to
some part of a system other than by the
normal procedure.
(f)Denial of Service: The attacker sends almost
innumerable requests for information/e-mail
that cause a computer systems to crash.
10. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
TOOLS FOR CYBER
TERRORISM
(g) Use of Cryptography and
Steganography: to aid terrorism
Cryptography: Information is transformed into
unreadable format (cipher text). Only those
who possess a secret key can decipher (or
decrypt) the message into plain text.
Steganography: Writing hidden messages in a
way that no one, apart from the sender and
intended recipient, suspects the existence of
the message.
11. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
INCIDENCE OF CYBER
TERRORISM
Al Qaeda Terrorist used the Internet to plan the September11,
2001 operations upon new York City and Washington D.C.
They used a special internet chat software for communication.
A nuclear power plant in Iran was attacked by the Stuxnet
worm. The worm installed itself in the plant’s
PLC (Programming Logic Controller)
computer-controlled system and caused a
change in the rotational speed of machinery.
The increased speed without the usual
automated shut-down controls caused the
nuclear plant fusion center to spin
uncontrollably and explode.
20102010
20012001
12. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
ACTS OF CYBER
TERRORISM IN INDIA
• In the case of 26/11 Mumbai attacks, terrorists used
cyber communication to aide the terrorists to carry on
with the massacre.
• Cyber communication was also used in July 2011
Jhaveri Bazaar Mumbai bomb blasts and 2010
Varanasi blasts.
13. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
INDIA : FEW INITIATIVES
The Government of India has put in place some
mechanisms to counter the threat of cyber terrorism.
• Indian Computer Emergency Response Team (CERT-
In): a functional organization of the department of
Information Technology with the objective of
securing Indian cyber space.
• National Cyber Security Assurance Framework is
established by the CERT-In for protection of Critical
Information.
• The Information Technology Act, 2000 and IT
(Amendment) Act 2008.
14. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
THE INFORMATION TECHNOLOGY ACT,
2000 AND IT ACT AMENDMENT 2008.
• Amendments under the Information Technology Act,
2000 has defined the term “Cyber terrorism” U/Sec.
66F (1).
• Punishment for Cyber terrorism
Whoever commits or conspires to commit cyber terrorism shall be
punishable with imprisonment which may extend to
imprisonment for life. (Section 66F (2))
• Section 69 gives power to the state to issue directions
for interception or monitoring or decryption of any
information through any computer source.
• Section 70 A and 70 B- Agency for critical
information and Indian Computer Emergency response
team (CERT-In) for incident response.
15. CHENNAI
3rd Floor, ‘Creative Enclave’,
148-150, Luz Church Road,
Mylapore,
Chennai - 600 004.
Tel: +91 - 44 - 2498 4821
BANGALORE
Suite 920, Level 9,
Raheja Towers,
26-27, M G Road,
Bangalore - 560 001.
Tel: +91 - 80 - 6546 2400
COIMBATORE
BB1, Park Avenue,
# 48, Race Course Road,
Coimbatore - 641018.
Tel: +91 - 422 – 6552921
EMAIL
info@altacit.com
WEBSITE
www.altacit.com
THANK YOU