SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Downloaden Sie, um offline zu lesen
E hi l H ki dEthical Hacking and
Countermeasures
V i 6Version6
Module XLIII
Cyber Warfare- Hacking
Al-Qaida and Terrorism
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.informationweek.com
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.news.com/
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.wired.com/
Module Objective
This module will familiarize you with:
• Cyber Terrorism Over Internet
• Cyber-Warfare Attacks
• Al-QaedaQ
• Why Terrorists Use Cyber Techniques
• Cyber Support to Terrorist Operations
• Cyber Threat to the Military
• Electronic Jihad• Electronic Jihad
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Cyber Terrorism Over Cyber Support to Terrorist
iInternet Operations
Cyber-Warfare Attacks Cyber Threat to the Military
Al-Qaeda Electronic Jihad
Why Terrorists Use Cyber
Techniques
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
q
Cyber Terrorism Over Internet
According to http://www.cybercrimes.net/Terrorism, FBI
defined Cyber terrorism as “the use of computing resourcesdefined Cyber terrorism as the use of computing resources
against persons or property to intimidate or coerce a
government, the civilian population, or any segment thereof,
in furtherance of political or social objectives”
Cyber-terrorism is the leveraging of a target's computer and
information technology particularly via the Internet to causeinformation technology, particularly via the Internet, to cause
physical, real-world harm,or severe disruption
Cyerb terrorism can weaken countries economy; by doing this
it can strip the country of its resources and make it more
vulnerable to military attack
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
vulnerable to military attack
Cyber-Warfare Attacks
Computer virus, logic bombs, and Trojan horse attacks
Cyber Bullying
• It is the use of electronic information and
communication devices such as e-mail, instant
messaging, text messages, blogs, mobile phones,
pagers instant messages and defamatory websitespagers, instant messages, and defamatory websites
to bully or harass the others
Cyber Stalking
• It is the use of the Internet or other electronic means
to stalk someone
Cyber Stalking
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• It is used with online harassment and online abuse
Cyber-Warfare Attacks (cont’d)
Web vandalism:
• Attacks that deface WebPages, or denial-of-service
attacks
Propaganda:
• Political messages can be spread through or to
anyone by accessing Internet
h i d
• Classified information that is not handled securely
can be intercepted and even modified making
Gathering data:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
can be intercepted and even modified, making
espionage possible from other side of the world
Cyber-Warfare Attacks (cont’d)
Distributed Denial-of-Service Attacks:
• Large numbers of computers in one country launch a DoS
attack against systems in another country
• Military activities that use computers and satellites for
Equipment disruption:
• Military activities that use computers and satellites for
co-ordination are at risk from this type of attack, putting
soldiers at risk
• Power, water, fuel, communications, commercial, and
Attacking critical infrastructure:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
transportation are all vulnerable to a cyber attack
45 Muslim Doctors Planned US
Terror RaidsTerror Raids
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.telegraph.co.uk/
Net Attack
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://counterterrorismblog.org/
Al-Qaeda
Al Q d i i t ti l lli f I l i ilit tAl-Qaeda is an international alliance of Islamic militant
organizations founded in 1988
Al-Qaeda has attacked civilian and military targets in
various countries; the most notable being the September
k h d i k Ci d11, 2001 attacks that occurred in New York City and
Northern Virginia
Characteristic terror techniques include use of suicide
attacks and simultaneous bombings of different targets
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g g
Why Terrorists Use Cyber
TechniquesTechniques
The Cyber Division of the FBI states that in the future,
cyber-terrorism may become a viable option to
traditional physical acts of violence due to:
• Anonymity
• Diverse targets
• Low risk of detection
Lo risk of personal injur• Low risk of personal injury
• Low investment
• Operate from nearly any location
• Few resources are needed
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Support to Terrorist
OperationsOperations
Terrorists recognize the benefit of cyber
operations and continue to exploit
i f i h l i f i finformation technology in every function of
their operations
C b f d i f dit d th ft tCyber fraud, ranging from credit card theft to
money laundering, is the latest wrinkle in
terrorists' use of the Internet
Online scams are harder to trace because
they are relayed through a sophisticated
network of individuals and Web sites
worldwideworldwide
Groups including al-Qaeda use cyberspace
for communications recruiting and
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
for communications, recruiting, and
propaganda
Cyber Support to Terrorist
Operations (cont’d)Operations (cont d)
These operations include:
• Planning
• Recruitment
R h
p
• Research
• Propaganda
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Planning
Terrorists use the cyber Using steganography,
Th i d
Terrorists use the cyber
infrastructure to plan
attacks, communicate
with each other, and
posture for future
Using steganography,
they hide instructions,
plans and pictures for
their attacks in pictures
and posted comments
The images and
instructions can only be
opened using a “private
key” or code known
l t th i i t
posture for future
exploitation
and posted comments
in chat rooms
only to the recipients
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Recruitment
R i i h lif bl d f i i iRecruitment is the life-blood of a terrorist organization
and they use multiple methods to entice new members
In addition to traditional methods, such as written
publications, local prayer leaders, audio-video cassettes
d C i h i i h iand CDs promoting their cause; terrorist groups use their
own websites to recruit new members
Terrorists provide their view of the history of their
organization, its cause, and additional information to
encourage potential members to join
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
encourage potential members to join
Research
Terrorists can tap into thousands of databases, libraries, and newsgroups
around the world to gather information on any subject that they need toaround the world to gather information on any subject that they need to
research
The information can be in the form of text, maps, satellite images, pictures, orThe information can be in the form of text, maps, satellite images, pictures, or
even video material
h f h h l h d h hThe use of search engines, such as Google, have made searching the Internet
very easy and allows terrorists to obtain critical information
Al Qaeda training manual recovered in Afghanistan states:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• “Using public sources openly and without resorting to illegal means, it is possible to
gather at least 80% of information about the enemy.”
Propaganda
Terrorists use propaganda to discredit their
enemy while making themselves look good
These groups post articles supporting their
agendas on these sites which make them instantlyagendas on these sites, which make them instantly
available to the worldwide cyber community
Terrorists make use of propaganda to enlist the
support of their own public for jihad and to
demoralize the enemy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cyber Threat to the Military
Military is linked together through the Global Information
Grid, computers, and computer networks
Terrorists think that the military is the only vulnerability
to command and control systems
A major threat to the military deals with the fact that a
large percentage of the Global Information Grid is
dependent upon commercial telecommunications links
and the Internet which are not controlled by DOD
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
and the Internet, which are not controlled by DOD
(Department of Defense)
Cyber Threat to the Military
(cont’d)(cont d)
Terrorists can hack the following
i f i
• Commercial transactions
information:
• Payrolls
• Sensitive research data
• Intelligence
• Operational plans• Operational plans
• Procurement sensitive source selection data
• Health records
• Personnel records
• Weapons systems maintenance records
• Logistics operations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Russia ‘hired botnets’ for Estonia
Cyber-WarCyber War
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.itnews.com.au/
NATO Threatens War with
RussiaRussia
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.strategypage.com/
Bush on Cyber War: ‘a subject I
can learn a lot about’can learn a lot about
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.theregister.co.uk/
E.U. Urged to Launch Coordinated
Effort Against CybercrimeEffort Against Cybercrime
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.networkworld.com/
Budget: Eye on Cyber-Terrorism
AttacksAttacks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.zdnet.com.au/
Cyber Terror Threat is Growing,
Says ReidSays Reid
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.telegraph.co.uk/
Terror Web 2.0
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://analysis.threatswatch.org/
Table 1: How Websites Support
Objectives of terrorist/Extremist GroupsObjectives of terrorist/Extremist Groups
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Table 1: How Websites Support Objectives
of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Electronic Jihad
Electronic Jihad software is used to let the owner of a
computer give control of his system to creator of e-
Jihad
h k f ih d h k fThe makers of e-Jihad can then use a network of
“zombies” to attack web sites and other Internet
servers
After installing e-Jihad, the user is asked for a
username and password that is sent to a central web
server
If the user does not have a username yet, he/she can
register a new one; he/she can even enter the
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g ; /
username of the person who invited him to e-Jihad
Electronic Jihad (cont’d)
El t i Jih d P i t f l t i i jih di W b it AlElectronic Jihad Program is a part of long-term vision jihadi Web site Al-
jinan.org to use the Internet as a weapon
Electronic Jihad allows users to target specific IP addresses for attack in
order to take any servers running at those IP addresses offline
Application includes a Windows-like interface that lets users choose from a
list of target Web sites provided via the Al-jinan site, select an attack speed
(weak, medium, or strong), and the click on the "attack" button( , , g),
The attacks from jihadists are interested in taking Web sites down and
disrupting economies that they do not like
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
disrupting economies that they do not like
Electronic Jihad: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Electronic Jihad' App Offers
Cyber Terrorism for the MassesCyber Terrorism for the Masses
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.informationweek.com
Cyber Jihad – Cyber Firesale
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://blogs.csoonline.com/
http://internet-
haganah com/haganah/haganah.com/haganah/
Source: http://internet-haganah.com/
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Mujahedeen Secrets Encryption
ProgramProgram
Mujahideen Secrets 2 is a new version of an encryption tool, ostensibly written
h l Al Q d b h i h Ito help Al Qaeda members encrypt secrets as they communicate on the Internet
The first edition file contained several encryption algorithms (including AES
256), 2048-bit encryption keys, ROM compression encryption and encryption256), 2048 bit encryption keys, ROM compression encryption and encryption
auto-detection, and file shredding capabilities
The second edition contains automatic message/messaging
encryption/authentication and file encryption as well as code signing andencryption/authentication and file encryption as well as code signing and
checking, and file shredding
This toolset provides groups like Al-Qaida to securely transmit and wipe their
filfiles
Second edition toolset demonstrates a software development lifecycle with
l l f hi i i d l i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
some level of sophistication and planning
Mujahedeen Secrets Encryption
Program: Screenshot 1Program: Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Mujahedeen Secrets Encryption
Program: Screenshot 2Program: Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Mujahedeen Secrets Encryption
Program: Screenshot 3Program: Screenshot 3
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Cyber terrorism is the use of computing resources against persons or property
to intimidate or coerce a government the civilian population or any segmentto intimidate or coerce a government, the civilian population, or any segment
thereof, in furtherance of political or social objectives
Cyber terrorism can weaken country’s economy, by doing this it can strip they y y, y g p
country of its resources and make it more vulnerable to military attack
Groups including al-Qaeda use cyberspace for communications, recruiting,Groups including al Qaeda use cyberspace for communications, recruiting,
and propaganda
Electronic Jihad software is used to let the owner of a computer give controlElectronic Jihad software is used to let the owner of a computer give control
of his system to creator of e-Jihad
Electronic Jihad Program is a part of long-term vision for which jihadi Web
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Electronic Jihad Program is a part of long term vision for which jihadi Web
site Al-jinan.org has to use the Internet as a weapon
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Ähnlich wie Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism

Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And TerrorismKislaychd
 
Ce hv6 module 67 identifying the terrorists
Ce hv6 module 67 identifying the terroristsCe hv6 module 67 identifying the terrorists
Ce hv6 module 67 identifying the terroristsVi Tính Hoàng Nam
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersVi Tính Hoàng Nam
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxBini R A
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT CollegesPotato
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 

Ähnlich wie Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism (20)

Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Ce hv6 module 67 identifying the terrorists
Ce hv6 module 67 identifying the terroristsCe hv6 module 67 identifying the terrorists
Ce hv6 module 67 identifying the terrorists
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
File000146
File000146File000146
File000146
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 

Mehr von Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Mehr von Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Kürzlich hochgeladen

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism

  • 1. E hi l H ki dEthical Hacking and Countermeasures V i 6Version6 Module XLIII Cyber Warfare- Hacking Al-Qaida and Terrorism
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com
  • 3. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.news.com/
  • 4. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.wired.com/
  • 5. Module Objective This module will familiarize you with: • Cyber Terrorism Over Internet • Cyber-Warfare Attacks • Al-QaedaQ • Why Terrorists Use Cyber Techniques • Cyber Support to Terrorist Operations • Cyber Threat to the Military • Electronic Jihad• Electronic Jihad EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. Module Flow Cyber Terrorism Over Cyber Support to Terrorist iInternet Operations Cyber-Warfare Attacks Cyber Threat to the Military Al-Qaeda Electronic Jihad Why Terrorists Use Cyber Techniques EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited q
  • 7. Cyber Terrorism Over Internet According to http://www.cybercrimes.net/Terrorism, FBI defined Cyber terrorism as “the use of computing resourcesdefined Cyber terrorism as the use of computing resources against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” Cyber-terrorism is the leveraging of a target's computer and information technology particularly via the Internet to causeinformation technology, particularly via the Internet, to cause physical, real-world harm,or severe disruption Cyerb terrorism can weaken countries economy; by doing this it can strip the country of its resources and make it more vulnerable to military attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited vulnerable to military attack
  • 8. Cyber-Warfare Attacks Computer virus, logic bombs, and Trojan horse attacks Cyber Bullying • It is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, blogs, mobile phones, pagers instant messages and defamatory websitespagers, instant messages, and defamatory websites to bully or harass the others Cyber Stalking • It is the use of the Internet or other electronic means to stalk someone Cyber Stalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • It is used with online harassment and online abuse
  • 9. Cyber-Warfare Attacks (cont’d) Web vandalism: • Attacks that deface WebPages, or denial-of-service attacks Propaganda: • Political messages can be spread through or to anyone by accessing Internet h i d • Classified information that is not handled securely can be intercepted and even modified making Gathering data: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited can be intercepted and even modified, making espionage possible from other side of the world
  • 10. Cyber-Warfare Attacks (cont’d) Distributed Denial-of-Service Attacks: • Large numbers of computers in one country launch a DoS attack against systems in another country • Military activities that use computers and satellites for Equipment disruption: • Military activities that use computers and satellites for co-ordination are at risk from this type of attack, putting soldiers at risk • Power, water, fuel, communications, commercial, and Attacking critical infrastructure: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited transportation are all vulnerable to a cyber attack
  • 11. 45 Muslim Doctors Planned US Terror RaidsTerror Raids EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.telegraph.co.uk/
  • 12. Net Attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://counterterrorismblog.org/
  • 13. Al-Qaeda Al Q d i i t ti l lli f I l i ilit tAl-Qaeda is an international alliance of Islamic militant organizations founded in 1988 Al-Qaeda has attacked civilian and military targets in various countries; the most notable being the September k h d i k Ci d11, 2001 attacks that occurred in New York City and Northern Virginia Characteristic terror techniques include use of suicide attacks and simultaneous bombings of different targets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g g
  • 14. Why Terrorists Use Cyber TechniquesTechniques The Cyber Division of the FBI states that in the future, cyber-terrorism may become a viable option to traditional physical acts of violence due to: • Anonymity • Diverse targets • Low risk of detection Lo risk of personal injur• Low risk of personal injury • Low investment • Operate from nearly any location • Few resources are needed EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Cyber Support to Terrorist OperationsOperations Terrorists recognize the benefit of cyber operations and continue to exploit i f i h l i f i finformation technology in every function of their operations C b f d i f dit d th ft tCyber fraud, ranging from credit card theft to money laundering, is the latest wrinkle in terrorists' use of the Internet Online scams are harder to trace because they are relayed through a sophisticated network of individuals and Web sites worldwideworldwide Groups including al-Qaeda use cyberspace for communications recruiting and EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited for communications, recruiting, and propaganda
  • 16. Cyber Support to Terrorist Operations (cont’d)Operations (cont d) These operations include: • Planning • Recruitment R h p • Research • Propaganda EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Planning Terrorists use the cyber Using steganography, Th i d Terrorists use the cyber infrastructure to plan attacks, communicate with each other, and posture for future Using steganography, they hide instructions, plans and pictures for their attacks in pictures and posted comments The images and instructions can only be opened using a “private key” or code known l t th i i t posture for future exploitation and posted comments in chat rooms only to the recipients EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Recruitment R i i h lif bl d f i i iRecruitment is the life-blood of a terrorist organization and they use multiple methods to entice new members In addition to traditional methods, such as written publications, local prayer leaders, audio-video cassettes d C i h i i h iand CDs promoting their cause; terrorist groups use their own websites to recruit new members Terrorists provide their view of the history of their organization, its cause, and additional information to encourage potential members to join EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited encourage potential members to join
  • 19. Research Terrorists can tap into thousands of databases, libraries, and newsgroups around the world to gather information on any subject that they need toaround the world to gather information on any subject that they need to research The information can be in the form of text, maps, satellite images, pictures, orThe information can be in the form of text, maps, satellite images, pictures, or even video material h f h h l h d h hThe use of search engines, such as Google, have made searching the Internet very easy and allows terrorists to obtain critical information Al Qaeda training manual recovered in Afghanistan states: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.”
  • 20. Propaganda Terrorists use propaganda to discredit their enemy while making themselves look good These groups post articles supporting their agendas on these sites which make them instantlyagendas on these sites, which make them instantly available to the worldwide cyber community Terrorists make use of propaganda to enlist the support of their own public for jihad and to demoralize the enemy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Cyber Threat to the Military Military is linked together through the Global Information Grid, computers, and computer networks Terrorists think that the military is the only vulnerability to command and control systems A major threat to the military deals with the fact that a large percentage of the Global Information Grid is dependent upon commercial telecommunications links and the Internet which are not controlled by DOD EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and the Internet, which are not controlled by DOD (Department of Defense)
  • 22. Cyber Threat to the Military (cont’d)(cont d) Terrorists can hack the following i f i • Commercial transactions information: • Payrolls • Sensitive research data • Intelligence • Operational plans• Operational plans • Procurement sensitive source selection data • Health records • Personnel records • Weapons systems maintenance records • Logistics operations EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Russia ‘hired botnets’ for Estonia Cyber-WarCyber War EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.itnews.com.au/
  • 24. NATO Threatens War with RussiaRussia EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.strategypage.com/
  • 25. Bush on Cyber War: ‘a subject I can learn a lot about’can learn a lot about EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.theregister.co.uk/
  • 26. E.U. Urged to Launch Coordinated Effort Against CybercrimeEffort Against Cybercrime EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.networkworld.com/
  • 27. Budget: Eye on Cyber-Terrorism AttacksAttacks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.zdnet.com.au/
  • 28. Cyber Terror Threat is Growing, Says ReidSays Reid EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.telegraph.co.uk/
  • 29. Terror Web 2.0 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://analysis.threatswatch.org/
  • 30. Table 1: How Websites Support Objectives of terrorist/Extremist GroupsObjectives of terrorist/Extremist Groups EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d)of terrorist/Extremist Groups (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Electronic Jihad Electronic Jihad software is used to let the owner of a computer give control of his system to creator of e- Jihad h k f ih d h k fThe makers of e-Jihad can then use a network of “zombies” to attack web sites and other Internet servers After installing e-Jihad, the user is asked for a username and password that is sent to a central web server If the user does not have a username yet, he/she can register a new one; he/she can even enter the EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g ; / username of the person who invited him to e-Jihad
  • 36. Electronic Jihad (cont’d) El t i Jih d P i t f l t i i jih di W b it AlElectronic Jihad Program is a part of long-term vision jihadi Web site Al- jinan.org to use the Internet as a weapon Electronic Jihad allows users to target specific IP addresses for attack in order to take any servers running at those IP addresses offline Application includes a Windows-like interface that lets users choose from a list of target Web sites provided via the Al-jinan site, select an attack speed (weak, medium, or strong), and the click on the "attack" button( , , g), The attacks from jihadists are interested in taking Web sites down and disrupting economies that they do not like EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited disrupting economies that they do not like
  • 37. Electronic Jihad: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Electronic Jihad' App Offers Cyber Terrorism for the MassesCyber Terrorism for the Masses EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com
  • 39. Cyber Jihad – Cyber Firesale EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://blogs.csoonline.com/
  • 40. http://internet- haganah com/haganah/haganah.com/haganah/ Source: http://internet-haganah.com/ EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Mujahedeen Secrets Encryption ProgramProgram Mujahideen Secrets 2 is a new version of an encryption tool, ostensibly written h l Al Q d b h i h Ito help Al Qaeda members encrypt secrets as they communicate on the Internet The first edition file contained several encryption algorithms (including AES 256), 2048-bit encryption keys, ROM compression encryption and encryption256), 2048 bit encryption keys, ROM compression encryption and encryption auto-detection, and file shredding capabilities The second edition contains automatic message/messaging encryption/authentication and file encryption as well as code signing andencryption/authentication and file encryption as well as code signing and checking, and file shredding This toolset provides groups like Al-Qaida to securely transmit and wipe their filfiles Second edition toolset demonstrates a software development lifecycle with l l f hi i i d l i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited some level of sophistication and planning
  • 42. Mujahedeen Secrets Encryption Program: Screenshot 1Program: Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Mujahedeen Secrets Encryption Program: Screenshot 2Program: Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Mujahedeen Secrets Encryption Program: Screenshot 3Program: Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. Summary Cyber terrorism is the use of computing resources against persons or property to intimidate or coerce a government the civilian population or any segmentto intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives Cyber terrorism can weaken country’s economy, by doing this it can strip they y y, y g p country of its resources and make it more vulnerable to military attack Groups including al-Qaeda use cyberspace for communications, recruiting,Groups including al Qaeda use cyberspace for communications, recruiting, and propaganda Electronic Jihad software is used to let the owner of a computer give controlElectronic Jihad software is used to let the owner of a computer give control of his system to creator of e-Jihad Electronic Jihad Program is a part of long-term vision for which jihadi Web EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Electronic Jihad Program is a part of long term vision for which jihadi Web site Al-jinan.org has to use the Internet as a weapon
  • 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited