SlideShare une entreprise Scribd logo
1  sur  38
DepartmentOf
ComputerScienceand Technology
PresentedBy
B Praveen Kumar
WHAT IS A CYBERWAR ??????
HOW A HACKER CAN HACK ANY SITE ?????
HOW MANY COUNTRIES ARE SUFFERING UNDER THIS ATTACKS?????
WHAT ARE THE COUNTREIS SUFFERING UNDER THIS CYBER ATTACK ???
WHAT ARE THE TRICKS USED BY HACKER TO HACK ANY SITE ?????
HOW WE CAN OVER COME THIS PROBLEM (ANY SOLUTION) ???????
So let’s see about it…….
Cyberwarfare is any virtual conflict initiatedas
a politically motivated attack on an enemy's
computer and information systems.
Waged via the Internet, these attacks disable
financial and organizational systems by stealing or
altering classified data to undetermined networks,
websites and services.
TYPES OF CYBER ATTACKS
 HACKING
 CHILD PORNOGRAPHY
 DENIAL OF SERVICE ATTACK
 VIRUS DISSEMINITION
 COMPUTER VANDALISM
 CYBER TERRORISM
 SOFTWARE PIRACY
Hacking :
Hacking in simple terms mean an illegal intrusion into a
computer system or network.
It is also known as CRACKING Government websites are the
hot targets of the hackers
The internet is being highly used by its abusers to reack
and abuse children sexually, worldwide.
As more homes have access to internet, more children
would be using the internet and more are the chances of
falling victim to the aggression of pedophiles
This is an act by the criminal, who floods the bandwidth
Of the victims network or fills his e-mail box with spam
Email depriving him of the services he is entitled to access
Malicious software that attaches itself to other
software.
(virus, worms, web hacking, e-mail bombing etc)
COMPUTER VANDALISM
 Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism.
 Transmitting virus: These are programs that
attach themselves to file and then circulate
Terroism attacks on the internet by distributed denial
of service attacks, fake websites and fake emails,
attacks on sensitive computer networks. Technology
hackers are using 512-bit
encryption, which is
impossible to decrypt.
SOFTWARE PIRACY
 Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
Internet security is a branch of computer security specifically
related to the internet.
It’s objective is to establish rules and measure to use against
attacks over the internet.
How a hacker
can hack any
site ?????
what is the
trick used
by hacker to
hack any
email id,
software
etc….
THIS IS HOW A HACKER THINKS AND IMPLAMENT
THEIR PLAN
10-GARY MCKIMON
9-LULZSEC
8-ADRIAN LAMO
7-MATHEW BEVAN AND RICHRAD PRYCE
Hacked us military computers and used them to infilitate foregin
system .
6-JANATHAN JAME
Forced NASA to shut down its network after stealing software that controlled
the Living envinorment on the international space station
4-kevin mitnick
3-anonymous
2-astra [ real identify classified]
1-albert “seqvec” gonzalez
Examples of cyberwarfare:
 In 1998, the United States hacked into Serbia's air defense system to
compromise air traffic control and facilitate the bombing of Serbian targets.
 In 2007, in Estonia, a botnet (also known as a zombie army)of over a million
computers brought down government, business and media websites across the
country. The attack was suspected to have originated in Russia, motivated by
political tension between the two countries.
Also in 2007, an unknown foreign party hacked into high tech and military
agencies in the United States and downloaded terabytes of information.
 In 2009, a cyber spy network called "GhostNet" accessed confidential
information belonging to both governmental and private organizations in over
100 countries around the world. GhostNet was reported to originate in
China, although that country denied responsibility.
The Internet security company McAfee stated in their 2007 annual report that
approximately 120 countries have been developing ways to use the Internet as
a weapon and target financial markets, government computer systems and
utilities
Cyber warfare by country :
On 7 April 2009, The Pentagon announced they spent more than $100
million in the last six months responding to and repairing damage from
cyber attacks and other computer network problems.
On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber
security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting
proposals that would empower the government to set and enforce security standards
for private industry for the first time.
On 21 November 2011, it was widely reported in the U.S. media that a hacker
had destroyed a water pump at the Curran-Gardner Township Public Water
District in Illinois. However, it later turned out that this information was not
only false, but had been inappropriately leaked from the Illinois Statewide
Terrorism and Intelligence Center
Cyber incidence :
On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the
website of India's top investigating agency, the Central Bureau of Investigation
(CBI). The National Informatics Center (NIC) has begun an inquiry.
On 26 November 2010, a group calling itself the Indian Cyber Army hacked the
websites belonging to the Pakistan Army and the others belong to different
ministries, including the Ministry of Foreign Affairs, Ministry of Education,
Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc.
The attack was done as a revenge for the Mumbai terrorist attacks .
CHINA HIT BY BIGGEST EVER CYBER ATTACK
 China has said it has suffered its “biggest ever” cyber attack (on 27/Aug/2013)
causing many websites based in the country to go temporarily offline .
 DDOS (distributed denial of service) said that attack This attack have targeted
server responsible for sites with a “.cn” domain name.
 Country has not speculated on who may be responsible
 China may have a vast population but it still has a developing landline and internet
infrastructure,
 Which has yet to reach 50 percent population
 There are 382 attacks in the past 24 hours, the highest number of attacks per
country on the map .
 Other hotspots include eastern and Southern Europe ,as well as five U.S states,
including New york, Delaware, Indiana ,Idaho, and California
CYBER ATTACK IN INDIA
 CHENNAI: India is estimated to have lost at least 22
Gigabytes of data in the slew of cyber attacks it has seen
of the targeted to various high-profile individuals and
organizations.
 India is the only country in which 11 different types of
organizations have been attacked including ministries
and embassies, military and scientific institutes,
aerospace research and IT companies and financial and
media organizations.
 Some of the victims are still unknown
ATTACKS IN INDIA ARE DAY BY DAY INCREASED
Top 10 countries that commit the most
cyber attacks
INDIA->REPONSIBLE FOR 2.3% OF THE WORLDS CYBER
ATTACKS
•There are about 93 billion emails are sent per day that will not
go through.
•Millions of VoIP calls per day will not go through.
•Over 200 million Google searches per day will not get done.
•A reported 33% of Internet users say they make ecommerce
transactions daily.
Contd…..Some 88% of online user say the Internet plays a role in their daily
routines.
Some 40% of Internet users who get the news online say they log on
daily.
Some 25% of the online weather bugs will check weather daily.
Some 20% of online sports fans check sports scores daily.
IMPACK OF CYBER WAR
 The political fallout of a cyber
attack will be high.
 But this will pale in comparison
to the financial and economic
impact !
 The financial and economic
impact could be as high as $30
billion a day
Physical impact
Social impact
Political impact
Financial impact
Billions U.S. Retail e-commerce Sales
$0
$50
$100
$150
$200
$250
2006 2007 2008 2009 2010
$425 million
a day.
• What if the Internet went away:
– For a day
– A week
– A month
• No eMails
• No eCommerce
Virtual business services of all sorts, accounting,
payroll and even sales would come to a halt, as
would many companies.
Modern Weapons Economics
What does a stealth bomber cost? $1.5 to $2 billion
What does a stealth fighter cost? $80 to $120 million
What does an cruise missile cost? $1 to $2 million
What does a cyber weapon cost? $300 to $50,000
Cyber Weapons Evolution
Some unknown facts
 1972 - TCP/IP invented
 1983 -First virus created
 1989 -World wide web created
 1998 -Google formed
 2007 -USAF cyber command is established
 2007 -Large scale DDOS attacks hit Estonia
 2009-cyber security designated as key presidential priority
 In one incident $10 million was stolen from ATM machine in
24 hours of period
 80% of banks fail to catch fraud’s
(www)
Conclusion :
Our nation is increasingly vulnerable to cyber
attacks that could have catastrophic effects on
critical infrastructure as well as severely damage
the country’s economy. Whether the attack is
focused on stealing our business and technology
secrets, disrupting our financial systems or worse,
the threat is real. Countries, terrorists and
extremists around the world are developing and
implementing cyber warfare doctrine, strategies
and weapons
Cyber war
Cyber war

Contenu connexe

Tendances

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 

Tendances (20)

Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
114-116
114-116114-116
114-116
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 

En vedette

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

En vedette (15)

Cyberwar
CyberwarCyberwar
Cyberwar
 
West Invasion of Asia
West Invasion of AsiaWest Invasion of Asia
West Invasion of Asia
 
West asia
West asiaWest asia
West asia
 
Isis and its impact
Isis and its impactIsis and its impact
Isis and its impact
 
ISIS A Global Threat
ISIS A Global ThreatISIS A Global Threat
ISIS A Global Threat
 
National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
 
Isis
IsisIsis
Isis
 
ISIS
ISISISIS
ISIS
 
Southeast Asia Geography
Southeast Asia GeographySoutheast Asia Geography
Southeast Asia Geography
 
Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)Islamic State of Iraq and Syria (ISIS)
Islamic State of Iraq and Syria (ISIS)
 
SAARC
SAARCSAARC
SAARC
 
online fixed orthodontics course
online fixed orthodontics courseonline fixed orthodontics course
online fixed orthodontics course
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Deforestation: Causes, Effects and Solutions
Deforestation: Causes, Effects and SolutionsDeforestation: Causes, Effects and Solutions
Deforestation: Causes, Effects and Solutions
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similaire à Cyber war

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
sunnysmith
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
Beza Belayneh
 

Similaire à Cyber war (20)

Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Cyber war

  • 2.
  • 3. WHAT IS A CYBERWAR ?????? HOW A HACKER CAN HACK ANY SITE ????? HOW MANY COUNTRIES ARE SUFFERING UNDER THIS ATTACKS????? WHAT ARE THE COUNTREIS SUFFERING UNDER THIS CYBER ATTACK ??? WHAT ARE THE TRICKS USED BY HACKER TO HACK ANY SITE ????? HOW WE CAN OVER COME THIS PROBLEM (ANY SOLUTION) ??????? So let’s see about it…….
  • 4. Cyberwarfare is any virtual conflict initiatedas a politically motivated attack on an enemy's computer and information systems. Waged via the Internet, these attacks disable financial and organizational systems by stealing or altering classified data to undetermined networks, websites and services.
  • 5. TYPES OF CYBER ATTACKS  HACKING  CHILD PORNOGRAPHY  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY
  • 6. Hacking : Hacking in simple terms mean an illegal intrusion into a computer system or network. It is also known as CRACKING Government websites are the hot targets of the hackers The internet is being highly used by its abusers to reack and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles
  • 7. This is an act by the criminal, who floods the bandwidth Of the victims network or fills his e-mail box with spam Email depriving him of the services he is entitled to access Malicious software that attaches itself to other software. (virus, worms, web hacking, e-mail bombing etc)
  • 8. COMPUTER VANDALISM  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.  Transmitting virus: These are programs that attach themselves to file and then circulate Terroism attacks on the internet by distributed denial of service attacks, fake websites and fake emails, attacks on sensitive computer networks. Technology hackers are using 512-bit encryption, which is impossible to decrypt.
  • 9. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Internet security is a branch of computer security specifically related to the internet. It’s objective is to establish rules and measure to use against attacks over the internet.
  • 10. How a hacker can hack any site ????? what is the trick used by hacker to hack any email id, software etc….
  • 11. THIS IS HOW A HACKER THINKS AND IMPLAMENT THEIR PLAN
  • 12.
  • 13. 10-GARY MCKIMON 9-LULZSEC 8-ADRIAN LAMO 7-MATHEW BEVAN AND RICHRAD PRYCE Hacked us military computers and used them to infilitate foregin system . 6-JANATHAN JAME Forced NASA to shut down its network after stealing software that controlled the Living envinorment on the international space station
  • 14. 4-kevin mitnick 3-anonymous 2-astra [ real identify classified] 1-albert “seqvec” gonzalez
  • 15. Examples of cyberwarfare:  In 1998, the United States hacked into Serbia's air defense system to compromise air traffic control and facilitate the bombing of Serbian targets.  In 2007, in Estonia, a botnet (also known as a zombie army)of over a million computers brought down government, business and media websites across the country. The attack was suspected to have originated in Russia, motivated by political tension between the two countries. Also in 2007, an unknown foreign party hacked into high tech and military agencies in the United States and downloaded terabytes of information.  In 2009, a cyber spy network called "GhostNet" accessed confidential information belonging to both governmental and private organizations in over 100 countries around the world. GhostNet was reported to originate in China, although that country denied responsibility.
  • 16. The Internet security company McAfee stated in their 2007 annual report that approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities Cyber warfare by country : On 7 April 2009, The Pentagon announced they spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems. On 1 April 2009, U.S. lawmakers pushed for the appointment of a White House cyber security "czar" to dramatically escalate U.S. defenses against cyber attacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.
  • 17. On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center Cyber incidence : On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry. On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks .
  • 18. CHINA HIT BY BIGGEST EVER CYBER ATTACK  China has said it has suffered its “biggest ever” cyber attack (on 27/Aug/2013) causing many websites based in the country to go temporarily offline .  DDOS (distributed denial of service) said that attack This attack have targeted server responsible for sites with a “.cn” domain name.  Country has not speculated on who may be responsible  China may have a vast population but it still has a developing landline and internet infrastructure,  Which has yet to reach 50 percent population  There are 382 attacks in the past 24 hours, the highest number of attacks per country on the map .  Other hotspots include eastern and Southern Europe ,as well as five U.S states, including New york, Delaware, Indiana ,Idaho, and California
  • 19.
  • 20. CYBER ATTACK IN INDIA  CHENNAI: India is estimated to have lost at least 22 Gigabytes of data in the slew of cyber attacks it has seen of the targeted to various high-profile individuals and organizations.  India is the only country in which 11 different types of organizations have been attacked including ministries and embassies, military and scientific institutes, aerospace research and IT companies and financial and media organizations.  Some of the victims are still unknown
  • 21. ATTACKS IN INDIA ARE DAY BY DAY INCREASED
  • 22. Top 10 countries that commit the most cyber attacks
  • 23. INDIA->REPONSIBLE FOR 2.3% OF THE WORLDS CYBER ATTACKS
  • 24.
  • 25. •There are about 93 billion emails are sent per day that will not go through. •Millions of VoIP calls per day will not go through. •Over 200 million Google searches per day will not get done. •A reported 33% of Internet users say they make ecommerce transactions daily.
  • 26. Contd…..Some 88% of online user say the Internet plays a role in their daily routines. Some 40% of Internet users who get the news online say they log on daily. Some 25% of the online weather bugs will check weather daily. Some 20% of online sports fans check sports scores daily.
  • 27. IMPACK OF CYBER WAR  The political fallout of a cyber attack will be high.  But this will pale in comparison to the financial and economic impact !  The financial and economic impact could be as high as $30 billion a day Physical impact Social impact Political impact Financial impact
  • 28. Billions U.S. Retail e-commerce Sales $0 $50 $100 $150 $200 $250 2006 2007 2008 2009 2010 $425 million a day.
  • 29. • What if the Internet went away: – For a day – A week – A month • No eMails • No eCommerce Virtual business services of all sorts, accounting, payroll and even sales would come to a halt, as would many companies. Modern Weapons Economics
  • 30. What does a stealth bomber cost? $1.5 to $2 billion What does a stealth fighter cost? $80 to $120 million What does an cruise missile cost? $1 to $2 million What does a cyber weapon cost? $300 to $50,000
  • 32. Some unknown facts  1972 - TCP/IP invented  1983 -First virus created  1989 -World wide web created  1998 -Google formed  2007 -USAF cyber command is established  2007 -Large scale DDOS attacks hit Estonia  2009-cyber security designated as key presidential priority  In one incident $10 million was stolen from ATM machine in 24 hours of period  80% of banks fail to catch fraud’s (www)
  • 33.
  • 34.
  • 35.
  • 36. Conclusion : Our nation is increasingly vulnerable to cyber attacks that could have catastrophic effects on critical infrastructure as well as severely damage the country’s economy. Whether the attack is focused on stealing our business and technology secrets, disrupting our financial systems or worse, the threat is real. Countries, terrorists and extremists around the world are developing and implementing cyber warfare doctrine, strategies and weapons