3. WHAT IS A CYBERWAR ??????
HOW A HACKER CAN HACK ANY SITE ?????
HOW MANY COUNTRIES ARE SUFFERING UNDER THIS ATTACKS?????
WHAT ARE THE COUNTREIS SUFFERING UNDER THIS CYBER ATTACK ???
WHAT ARE THE TRICKS USED BY HACKER TO HACK ANY SITE ?????
HOW WE CAN OVER COME THIS PROBLEM (ANY SOLUTION) ???????
So let’s see about it…….
4. Cyberwarfare is any virtual conflict initiatedas
a politically motivated attack on an enemy's
computer and information systems.
Waged via the Internet, these attacks disable
financial and organizational systems by stealing or
altering classified data to undetermined networks,
websites and services.
5. TYPES OF CYBER ATTACKS
HACKING
CHILD PORNOGRAPHY
DENIAL OF SERVICE ATTACK
VIRUS DISSEMINITION
COMPUTER VANDALISM
CYBER TERRORISM
SOFTWARE PIRACY
6. Hacking :
Hacking in simple terms mean an illegal intrusion into a
computer system or network.
It is also known as CRACKING Government websites are the
hot targets of the hackers
The internet is being highly used by its abusers to reack
and abuse children sexually, worldwide.
As more homes have access to internet, more children
would be using the internet and more are the chances of
falling victim to the aggression of pedophiles
7. This is an act by the criminal, who floods the bandwidth
Of the victims network or fills his e-mail box with spam
Email depriving him of the services he is entitled to access
Malicious software that attaches itself to other
software.
(virus, worms, web hacking, e-mail bombing etc)
8. COMPUTER VANDALISM
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.
Transmitting virus: These are programs that
attach themselves to file and then circulate
Terroism attacks on the internet by distributed denial
of service attacks, fake websites and fake emails,
attacks on sensitive computer networks. Technology
hackers are using 512-bit
encryption, which is
impossible to decrypt.
9. SOFTWARE PIRACY
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Internet security is a branch of computer security specifically
related to the internet.
It’s objective is to establish rules and measure to use against
attacks over the internet.
10. How a hacker
can hack any
site ?????
what is the
trick used
by hacker to
hack any
email id,
software
etc….
11. THIS IS HOW A HACKER THINKS AND IMPLAMENT
THEIR PLAN
12.
13. 10-GARY MCKIMON
9-LULZSEC
8-ADRIAN LAMO
7-MATHEW BEVAN AND RICHRAD PRYCE
Hacked us military computers and used them to infilitate foregin
system .
6-JANATHAN JAME
Forced NASA to shut down its network after stealing software that controlled
the Living envinorment on the international space station
15. Examples of cyberwarfare:
In 1998, the United States hacked into Serbia's air defense system to
compromise air traffic control and facilitate the bombing of Serbian targets.
In 2007, in Estonia, a botnet (also known as a zombie army)of over a million
computers brought down government, business and media websites across the
country. The attack was suspected to have originated in Russia, motivated by
political tension between the two countries.
Also in 2007, an unknown foreign party hacked into high tech and military
agencies in the United States and downloaded terabytes of information.
In 2009, a cyber spy network called "GhostNet" accessed confidential
information belonging to both governmental and private organizations in over
100 countries around the world. GhostNet was reported to originate in
China, although that country denied responsibility.
16. The Internet security company McAfee stated in their 2007 annual report that
approximately 120 countries have been developing ways to use the Internet as
a weapon and target financial markets, government computer systems and
utilities
Cyber warfare by country :
On 7 April 2009, The Pentagon announced they spent more than $100
million in the last six months responding to and repairing damage from
cyber attacks and other computer network problems.
On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber
security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting
proposals that would empower the government to set and enforce security standards
for private industry for the first time.
17. On 21 November 2011, it was widely reported in the U.S. media that a hacker
had destroyed a water pump at the Curran-Gardner Township Public Water
District in Illinois. However, it later turned out that this information was not
only false, but had been inappropriately leaked from the Illinois Statewide
Terrorism and Intelligence Center
Cyber incidence :
On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the
website of India's top investigating agency, the Central Bureau of Investigation
(CBI). The National Informatics Center (NIC) has begun an inquiry.
On 26 November 2010, a group calling itself the Indian Cyber Army hacked the
websites belonging to the Pakistan Army and the others belong to different
ministries, including the Ministry of Foreign Affairs, Ministry of Education,
Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc.
The attack was done as a revenge for the Mumbai terrorist attacks .
18. CHINA HIT BY BIGGEST EVER CYBER ATTACK
China has said it has suffered its “biggest ever” cyber attack (on 27/Aug/2013)
causing many websites based in the country to go temporarily offline .
DDOS (distributed denial of service) said that attack This attack have targeted
server responsible for sites with a “.cn” domain name.
Country has not speculated on who may be responsible
China may have a vast population but it still has a developing landline and internet
infrastructure,
Which has yet to reach 50 percent population
There are 382 attacks in the past 24 hours, the highest number of attacks per
country on the map .
Other hotspots include eastern and Southern Europe ,as well as five U.S states,
including New york, Delaware, Indiana ,Idaho, and California
19.
20. CYBER ATTACK IN INDIA
CHENNAI: India is estimated to have lost at least 22
Gigabytes of data in the slew of cyber attacks it has seen
of the targeted to various high-profile individuals and
organizations.
India is the only country in which 11 different types of
organizations have been attacked including ministries
and embassies, military and scientific institutes,
aerospace research and IT companies and financial and
media organizations.
Some of the victims are still unknown
25. •There are about 93 billion emails are sent per day that will not
go through.
•Millions of VoIP calls per day will not go through.
•Over 200 million Google searches per day will not get done.
•A reported 33% of Internet users say they make ecommerce
transactions daily.
26. Contd…..Some 88% of online user say the Internet plays a role in their daily
routines.
Some 40% of Internet users who get the news online say they log on
daily.
Some 25% of the online weather bugs will check weather daily.
Some 20% of online sports fans check sports scores daily.
27. IMPACK OF CYBER WAR
The political fallout of a cyber
attack will be high.
But this will pale in comparison
to the financial and economic
impact !
The financial and economic
impact could be as high as $30
billion a day
Physical impact
Social impact
Political impact
Financial impact
28. Billions U.S. Retail e-commerce Sales
$0
$50
$100
$150
$200
$250
2006 2007 2008 2009 2010
$425 million
a day.
29. • What if the Internet went away:
– For a day
– A week
– A month
• No eMails
• No eCommerce
Virtual business services of all sorts, accounting,
payroll and even sales would come to a halt, as
would many companies.
Modern Weapons Economics
30. What does a stealth bomber cost? $1.5 to $2 billion
What does a stealth fighter cost? $80 to $120 million
What does an cruise missile cost? $1 to $2 million
What does a cyber weapon cost? $300 to $50,000
32. Some unknown facts
1972 - TCP/IP invented
1983 -First virus created
1989 -World wide web created
1998 -Google formed
2007 -USAF cyber command is established
2007 -Large scale DDOS attacks hit Estonia
2009-cyber security designated as key presidential priority
In one incident $10 million was stolen from ATM machine in
24 hours of period
80% of banks fail to catch fraud’s
(www)
33.
34.
35.
36. Conclusion :
Our nation is increasingly vulnerable to cyber
attacks that could have catastrophic effects on
critical infrastructure as well as severely damage
the country’s economy. Whether the attack is
focused on stealing our business and technology
secrets, disrupting our financial systems or worse,
the threat is real. Countries, terrorists and
extremists around the world are developing and
implementing cyber warfare doctrine, strategies
and weapons