Sunteți pe pagina 1din 20

304KM

Information Technology and Global Development




Jahangir, Jane, Alex, Abish and Bader
Group H
Cyber-Terrorism
Why are we doing this?
What are our objectives?
What will you gain from listening to our
presentation?
Figure 1.0
Understand the meaning of Cyber-terrorism.
Be able to state three different types of Cyber-
terrorism.
Be aware of the approaches taken to tackle this
form of terrorism.
Feel confident in knowing the impact it has upon
society.
Collins Dictionary
The illegal use of computers and the internet to achieve some goal. (Collins
Dictionary n.d.)

United States Armed Forces
Cyber-terrorism means premeditated attacks, politically motivated attacks by sub
national groups or clandestine agents, or individuals against information and
computer systems, programs and data that result in violence against non-
combatant targets. (Janczewski 2008)

According to (Denning, 2000), defines Cyber Terrorism has unlawful attack and
threats of attacks against computers, networks and the information stores in the
computer system.

Computer Hacking

Privacy Violation

Data Interference or Theft

Demolition of an e-governance base

Network damage or disruptions
Computer hacking is the main form of cyber
terrorism

Gathering and viewing information without
permission

Lets you gain to passwords and documents

Allows computer abuse
Against the data protection act (Breaking Law)

Require Permission

Its breaching the persons personal data which
can be from documents, pictures financial and
important data.

Privacy is important.
The access to change important data which could
include passwords bank details or personal
records.

Could change government or the countries
national security data.

Destruction to the property and a entity such as
deleting important data.
The access to destroy the government of a
country

Destroys major files, the country's social ,
economical and political data.

Data can be passed on to other rival countries
and they can exploit the country.
Done through viruses, Trojans, hacking.

Done to affect the systems, makes them weaker.

In order to affect and harm the network so that
the company is busy working on rebuilding whilst
more attacks are sent.

A weak system is easier to attack
Online technology

Cyber-Jihad

Social networking sites

Google maps


Iran accused of Cyber attacks on American
Banks in 2012.
Sonys PlayStation Network was attacked for
the third time in 2011.
Email Spamming
Russia accused of Cyberwar
Russia accused of Cyberattack
Technology is advancing
Integrated in essential services such as
- Healthcare
- Bank
- Government
Terrorist use weapons
Email and ATM machine
Terrorists use the internet
Terrorists showing interest

Threat becoming real
No limitations for terrorists
Extremist websites
Vulnerability of infrastructure


Educate
Physical Security Measures
Cyber squads
Encryption
Peer to peer networks
Control email access
Update antivirus software and firewalls
System audit

Cyber Terrorism is the use of computer and the
internet to achieve the goal of harming another
individual.

Occurs in various forms.

Education is the key to protecting yourself from
cyber-terrorism.



Collins Dictionary (n.d.) Definition of cyberterrorism [Online] available from
<http://www.collinsdictionary.com/dictionary/english/cyberterrorism> [28 December 2012]

NBC News (2012) US: Hackers in Iran responsible for cyberattacks [Online] Available from
<http://www.nbcnews.com/technology/technolog/us-hackers-iran-responsible-cyberattacks-1C6423908>
[05 January 2012]

Gordon, S. Ford, R. (2003) Cyberterrorism? [Online] Available from
<http://www.symantec.com/avcenter/reference/cyberterrorism.pdf> [01 January 2012]

Banks, L. Computer World (2011) Sony hit by third cyber attack against PlayStation network [Online] available from <
http://www.computerworld.com.au/article/385717/sony_hit_by_third_cyber_attack_against_playstation_networ
k/> [29 December 2012]

Heidari, M. (2010) Forms of Cyber-Terrorism [Online] available from <
http://maryamheidari.blogspot.co.uk/2010/04/forms-of-cyber-terrorism.html> [22 December 2012]

Janczewski, L. (2008) Cyber Warfare and Cyber Terrorism [Online] USA: Information Science Reference available
from < http://books.google.co.uk/books?hl=en&lr=&id=6CJ-aV9Dh-
QC&oi=fnd&pg=PT1&dq=cyber+terrorism&ots=ql0YlC_RQh&sig=oIrt2i1atOs-ZQXVZE7u7O9-9BU> [05 January
2012]

Figure 1.0
Mike Werner (n.d.) The Myth of Cyberterrorism [Online] available from
<http://www.washingtonmonthly.com/features/2001/0211.green.html> [29 December 2012]

Heidari, M. (2010) Forms of Cyber terrorism [online], Available:
http://maryamheidari.blogspot.co.uk/2010/04/forms-of-cyber-terrorism.html [2010].

Leyden, J. (2005) Phlooding attack could leave enterprises high and dry, Available:
http://www.theregister.co.uk/2005/07/13/phlooding_wifi_security_threat [2005]

Sproles, J. and Byars, W. (1998) Examples of Cyber Terrorism:Computer Ethics, [Online],
Available: http://csciwww.etsu.edu/gotterbarn/stdntppr/cases.htm [2012].

IPT (2010) FBI: Cyber Terrorism is Growing Threat [online] available from
http://www.investigativeproject.org/1831/fbi-cyber-terrorism-is-growing-threat [10
January 2013]
The Guardian (2007) Russia accused of unleashing cyberwar to disable Estonia [online]
available from http://www.guardian.co.uk/world/2007/may/17/topstories3.russia [20
January 2013]
Cnet (2008) Georgia accuses Russia of coordinateed cyberattack [online] available from
http://news.cnet.com/8301-1009_3-10014150-83.html [20 January 2013]

The Independent (2011) warning the rise of cyber-terrorism [online] available from
http://www.independent.co.uk/news/uk/crime/warning-of-rise-in-cyberterrorism-
2312434.html [20 January 2013}
Hub Pages (no date) what is cyber terrorism [online] available from
http://massivedynamic.hubpages.com/hub/What-Is-Cyber-Terrorism [24 January 2013]
D Space (2009) Cyber-terrorism how real is the threat [online] available from <
http://dspace.cigilibrary.org/jspui/handle/123456789/15033> [24 January 2013]
Front Line (no date) interview john hamre [online] available from <
http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html>
[24 January 2013]

S-ar putea să vă placă și