4. CYBER WAR
The use of computers to disrupt the
activities of an enemy country, especially the
deliberate attacking of communication
systems.
5.
6. Cyberterrorism Definition
1.
Political agenda
2.
Use of computers and cyberspace to disrupt
or destroy (may or may not lead to deaths)
3.
Civilians as targets
4.
Publicity
5.
Non-state actors
Traditional Terrorism definition:
•
Use of violence
7. Cyber Terrorism
Cyber terrorism is the use of Internet
based attacks in terrorist activities,
including acts of deliberate, large-scale
disruption of computer networks, especially
of personal computers attached to the
Internet, by the means of tools such
as computer viruses.
8. Cyber terrorism can be also defined as the
intentional use of computer networks, and
public internet to cause destruction and harm
for personal objectives . Objectives may be
political or ideological since this is a form of
terrorism.
10. Distributed denial-of-service attack (DDoS)
A distributed denial-of-service (DDoS) attack
is one in which a multitude of compromised systems
attack a single target, thereby causing denial of
service for users of the targeted system.
The flood of incoming messages to the target
system essentially forces it to shut down.
Types:
Network centric attack (bandwidth)
Application layer attack(app., calls)
11. Cyberspace:
The term cyberspace has become a conventional means to describe
anything associated with the Internet and the diverse Internet culture.
Amongst individuals on cyberspace, there is believed to be a code
of shared rules and ethics mutually beneficial for all to follow, referred to
as cyberethics.
14. The Nature of the Internet:
Strength and Weaknesses
• Redundancy
• Flaws
• Wireless
• Reliance on private
• Vulnerabilities and
flaws can be corrected
sector
15. Cyber security
Complex security risks and challenges.
Limiting the risk to data before attacks occur is
accomplished through risk assessment
&management.
16. Solutions:
We provide the following
ProActive&ReActivetechniqs :
Peventive safety measures to tackle cyber attacks,
setting up own team, Computer Forensics, Social
Engineering, identifying vulnerabilities and patching up,
investigating various Cyber Crimes, Penetration and
other crash courses.
18. Advantages:
•Using Cyber Warfare we can obtain critical information on
our enemies.
•New job opportunities in the IT world in this field, especially for
military
Disadvantages:
•We need to be very careful how and were we put data on the web.
•The US is attacked millions of times daily.
•If someone were to break through our cyber security it could have a
huge impact.
•It could take hours to days to fix a breach in security.
19. Conclusion:
o
Capacity of human mind is unfathomable. It is not possible to
eliminate cyber crime from the cyber space. It is quite possible to check
them. History is the witness that no legislation has succeeded in totally
eliminating crime from the globe.
o
The only possible step is to make people aware of their rights
and duties (to report crime as a collective duty towards the society) and
further making the application of the laws more stringent to check crime.
http://mutex.gmu.edu:2048/login?url=http://