Cyber Terrorism - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Cyber Terrorism

Description:

... biological and chemical weapons at the top of a list of city officials' fears. ... one person in Iraq could bring down the power grid of a large portion of the US ... – PowerPoint PPT presentation

Number of Views:3417
Avg rating:5.0/5.0
Slides: 12
Provided by: charles63
Category:
Tags: cities | cyber | in | iraq | list | of | terrorism

less

Transcript and Presenter's Notes

Title: Cyber Terrorism


1
Cyber Terrorism
2
Not your fathers type war
3
Cyber-Terrorism
  • target's computers and information technology,
    particularly via the Internet, to cause physical,
    real-world harm or severe disruption of
    infrastructures.
  • Also called infowar, netwar, cyberharassment,
    virtual warfare, digital terrorism, cybertactics,
    computer warfare, cyberattack, and
    cyber-break-ins

4
Why Cyber-Terrorism?
  • For political or military motives
  • Monetary gains would be cyber-crime
  • For hate, revenge, jealousy, meanness
  • To create fear and instability if not actual
    physical damage to property.
  • a survey of 725 cities conducted in 2003 by the
    National League of Cities found that
    cyber-terrorism ranked alongside biological and
    chemical weapons at the top of a list of city
    officials' fears.
  • Cheap, annoumous, remote, the variety of targets
    available, can affect a much larger audience.
  • one person in Iraq could bring down the power
    grid of a large portion of the US causing similar
    havoc of many troops, bombs, tanks guns

5
  • An electronic invasion could control a company
    and its resources without first destroying those
    resources with conventional war tactics.
  • To Steal Money
  • To finance their efforts
  • To Discrupt business and personal lives
  • To support conventional war
  • Knock out communicatons, supply chain,support
    services

6
How have/are/will they do it.
  • DoS Denial of Service
  • 911, fire, medical, fanancial
  • Control resources
  • Dam water levels, electricity,
  • Disseminate false information
  • Who made the attacks, where, how bad,

7
What resources are targeted
  • Power Stations
  • 911
  • Transportation Rail, Airlines, subways
  • Communications- TV, Radio, networks, police, fire
    stations
  • Economy- Banks, Stock Market
  • Military-Early detection, communications,
    retaliation communications
  • Human lives- Hospitals, Water, electricity

8
Who are they?
  • China, Russia, Korea, Israel, India, Grease and
    probably US.
  • China was said to have military schools just for
    teaching cyber-terrorism methods.
  • Al Qaeda could be a potential candidate
  • Iraq-was supposed to have in December 2001 the
    existence of an "Iraq Net." consisting of more
    than one hundred websites set up across the world
    by Iraq since the mid-nineties to launch
    denial-of-service (DoS) attacks against U.S.
    companies
  • New Breed of cyber-terrorists

9
What have we done to prepare?
  • After 9/11 the attacks, the federal government
    requested 4.5 billion for infrastructure
    security, and the FBI now boasts more than one
    thousand "cyber investigators."
  • 93 Million in 2007 allocated to Homeland
    Security to defend against Cyber-terrorist
    attacks
  • US Senate ratifies cybercrime treaty on August 3,
    2006

10
Future Preparations
  • Security Secretary Michael Chertoff says Billions
    alocated in 2009 for Government Network Security
  • 90 of requested funding for CNCI (Comprehensive
    Natinal CyberSecurity Initiative for 2009
    approved. The largest single request
  • Future costs from present from present 5.1
    Billion to 6.3 Billion

11
What can YOU do to prepare
  • as new UNCA CSCI graduates?

Ill study on it tonight
Write a Comment
User Comments (0)
About PowerShow.com