100%(1)100% au considerat acest document util (1 vot)
326 vizualizări20 pagini
This document discusses cyber terrorism and defines it as the illegal use of computers and the internet to achieve some goal. It outlines different types of cyber terrorism such as computer hacking, privacy violation, and data interference or theft. The document then provides examples of cyber attacks by different groups and countries. It emphasizes that cyber terrorism is a growing threat due to society's increasing reliance on internet-connected technology and discusses some approaches to tackling this threat, such as education and security measures.
This document discusses cyber terrorism and defines it as the illegal use of computers and the internet to achieve some goal. It outlines different types of cyber terrorism such as computer hacking, privacy violation, and data interference or theft. The document then provides examples of cyber attacks by different groups and countries. It emphasizes that cyber terrorism is a growing threat due to society's increasing reliance on internet-connected technology and discusses some approaches to tackling this threat, such as education and security measures.
This document discusses cyber terrorism and defines it as the illegal use of computers and the internet to achieve some goal. It outlines different types of cyber terrorism such as computer hacking, privacy violation, and data interference or theft. The document then provides examples of cyber attacks by different groups and countries. It emphasizes that cyber terrorism is a growing threat due to society's increasing reliance on internet-connected technology and discusses some approaches to tackling this threat, such as education and security measures.
Jahangir, Jane, Alex, Abish and Bader Group H Cyber-Terrorism Why are we doing this? What are our objectives? What will you gain from listening to our presentation? Figure 1.0 Understand the meaning of Cyber-terrorism. Be able to state three different types of Cyber- terrorism. Be aware of the approaches taken to tackle this form of terrorism. Feel confident in knowing the impact it has upon society. Collins Dictionary The illegal use of computers and the internet to achieve some goal. (Collins Dictionary n.d.)
United States Armed Forces Cyber-terrorism means premeditated attacks, politically motivated attacks by sub national groups or clandestine agents, or individuals against information and computer systems, programs and data that result in violence against non- combatant targets. (Janczewski 2008)
According to (Denning, 2000), defines Cyber Terrorism has unlawful attack and threats of attacks against computers, networks and the information stores in the computer system.
Computer Hacking
Privacy Violation
Data Interference or Theft
Demolition of an e-governance base
Network damage or disruptions Computer hacking is the main form of cyber terrorism
Gathering and viewing information without permission
Lets you gain to passwords and documents
Allows computer abuse Against the data protection act (Breaking Law)
Require Permission
Its breaching the persons personal data which can be from documents, pictures financial and important data.
Privacy is important. The access to change important data which could include passwords bank details or personal records.
Could change government or the countries national security data.
Destruction to the property and a entity such as deleting important data. The access to destroy the government of a country
Destroys major files, the country's social , economical and political data.
Data can be passed on to other rival countries and they can exploit the country. Done through viruses, Trojans, hacking.
Done to affect the systems, makes them weaker.
In order to affect and harm the network so that the company is busy working on rebuilding whilst more attacks are sent.
A weak system is easier to attack Online technology
Cyber-Jihad
Social networking sites
Google maps
Iran accused of Cyber attacks on American Banks in 2012. Sonys PlayStation Network was attacked for the third time in 2011. Email Spamming Russia accused of Cyberwar Russia accused of Cyberattack Technology is advancing Integrated in essential services such as - Healthcare - Bank - Government Terrorist use weapons Email and ATM machine Terrorists use the internet Terrorists showing interest
Threat becoming real No limitations for terrorists Extremist websites Vulnerability of infrastructure
Educate Physical Security Measures Cyber squads Encryption Peer to peer networks Control email access Update antivirus software and firewalls System audit
Cyber Terrorism is the use of computer and the internet to achieve the goal of harming another individual.
Occurs in various forms.
Education is the key to protecting yourself from cyber-terrorism.
Collins Dictionary (n.d.) Definition of cyberterrorism [Online] available from <http://www.collinsdictionary.com/dictionary/english/cyberterrorism> [28 December 2012]
NBC News (2012) US: Hackers in Iran responsible for cyberattacks [Online] Available from <http://www.nbcnews.com/technology/technolog/us-hackers-iran-responsible-cyberattacks-1C6423908> [05 January 2012]
Gordon, S. Ford, R. (2003) Cyberterrorism? [Online] Available from <http://www.symantec.com/avcenter/reference/cyberterrorism.pdf> [01 January 2012]
Banks, L. Computer World (2011) Sony hit by third cyber attack against PlayStation network [Online] available from < http://www.computerworld.com.au/article/385717/sony_hit_by_third_cyber_attack_against_playstation_networ k/> [29 December 2012]
Heidari, M. (2010) Forms of Cyber-Terrorism [Online] available from < http://maryamheidari.blogspot.co.uk/2010/04/forms-of-cyber-terrorism.html> [22 December 2012]
Janczewski, L. (2008) Cyber Warfare and Cyber Terrorism [Online] USA: Information Science Reference available from < http://books.google.co.uk/books?hl=en&lr=&id=6CJ-aV9Dh- QC&oi=fnd&pg=PT1&dq=cyber+terrorism&ots=ql0YlC_RQh&sig=oIrt2i1atOs-ZQXVZE7u7O9-9BU> [05 January 2012]
Figure 1.0 Mike Werner (n.d.) The Myth of Cyberterrorism [Online] available from <http://www.washingtonmonthly.com/features/2001/0211.green.html> [29 December 2012]
Heidari, M. (2010) Forms of Cyber terrorism [online], Available: http://maryamheidari.blogspot.co.uk/2010/04/forms-of-cyber-terrorism.html [2010].
Leyden, J. (2005) Phlooding attack could leave enterprises high and dry, Available: http://www.theregister.co.uk/2005/07/13/phlooding_wifi_security_threat [2005]
Sproles, J. and Byars, W. (1998) Examples of Cyber Terrorism:Computer Ethics, [Online], Available: http://csciwww.etsu.edu/gotterbarn/stdntppr/cases.htm [2012].
IPT (2010) FBI: Cyber Terrorism is Growing Threat [online] available from http://www.investigativeproject.org/1831/fbi-cyber-terrorism-is-growing-threat [10 January 2013] The Guardian (2007) Russia accused of unleashing cyberwar to disable Estonia [online] available from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia [20 January 2013] Cnet (2008) Georgia accuses Russia of coordinateed cyberattack [online] available from http://news.cnet.com/8301-1009_3-10014150-83.html [20 January 2013]
The Independent (2011) warning the rise of cyber-terrorism [online] available from http://www.independent.co.uk/news/uk/crime/warning-of-rise-in-cyberterrorism- 2312434.html [20 January 2013} Hub Pages (no date) what is cyber terrorism [online] available from http://massivedynamic.hubpages.com/hub/What-Is-Cyber-Terrorism [24 January 2013] D Space (2009) Cyber-terrorism how real is the threat [online] available from < http://dspace.cigilibrary.org/jspui/handle/123456789/15033> [24 January 2013] Front Line (no date) interview john hamre [online] available from < http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html> [24 January 2013]