SlideShare ist ein Scribd-Unternehmen logo
1 von 15
1
Cyber Threats
   At the end of this lesson, the student should be able
    to:

     Define cyberterrorism and cyberwarfare;

     Identify five types of cyber attacks and understand the
      damage that cyber attacks can inflict;

     Discuss several recent examples of cyber attacks;

     Identify and explain the roles of two organizations
      involved in defending US cyberspace.

                            Counterintelligence                 2
“The use of computer networks to shut down critical
   infrastructure (such as energy, transportation,
  government operations) or to coerce or intimidate
        a government or civilian population.”

   (Source: Center for Strategic and International Studies)




                           Cyber Threats                      3
   Information war

     “The use of computers and other devices to
       attack an enemy’s information systems as
      opposed to an enemy’s armies or factories.”

         (Source: American Heritage New Dictionary)




                          Cyber Threats               4
   Trojan Horse: A computer program that conceals
    harmful code. A Trojan horse usually masquerades as
    a useful program that a user would wish to execute.

   Virus: A program that infects computer files, usually
    executable programs, by inserting a copy of itself into
    the file. These copies are usually executed when the
    infected file is loaded into memory, allowing the virus
    to affect other files. Unlike a computer worm, a virus
    requires human involvement (usually unwitting) to
    propagate.
                           Cyber Threats                      5
   Phishing: Using emails and websites designed to look
    like those of legitimate businesses/government
    agencies to deceive internet users into disclosing
    personal data, e.g. bank and financial account
    information and passwords.
   DoS (Denial of Service): A method of attack from a
    single source that denise system access to legitimate
    users by overwhelming the target computer with
    messages and blocking legitimate traffic. It can
    prevent a system from being able to exchange data
    with other systems of use the internet.
                          Cyber Threats                     6
   Distributed Denial of Service (DDoS): A
    variant of the DoS attack that uses a
    coordinated attack from a distributed system
    of computers rather than from a single source.
    It often makes use of worms to spread to
    multiple computers that can then attack the
    target.


                      Counterintelligence            7
Titan Rain (2003+)
 Series of coordinated attacks on US
  computers
 Thought to be Chinese in origin
 NASA, Lockheed Martin, and other vital
  organizations penetrated



                  Counterintelligence      8
Estonia, April 2007
 DDoS attack against Estonian
  banks, media and government
 Coincided with major civil unrest
  by Russian nationals




                        Cyber Threats   9
GhostNet
 Chinese cyberespionage network
 At least 103 countries penetrated
 Searches computers and emails, then turns
  on webcams and microphones to record any
  conversations within range



                  Counterintelligence         10
Cyber Threats   11
   Created in 2006
   Housed within DHS
   “responsible for enhancing the security,
    resiliency, and reliability of the nation's cyber
    and communications infrastructure”




                       Counterintelligence              12
   Created in June 2009

   Began operations in May 2010

   Part of the US Strategic Command, involving
    military units from the US Army, Navy, Air
    Force and Marines

   Directed by General Keith B. Alexander (also
    head of NSA)
                     Cyber Threats                 13
Plans, coordinates, integrates,
synchronizes and conducts
activities to:

 Direct the operations and defense of
    specified DoD information networks

 Prepare to, and when directed,
    conduct full spectrum military
    cyberspace operations in order to
    enable actions in all domains, ensure
    US/Allied freedom of action in
    cyberspace and deny the same to our
    adversaries.


Counterintelligence                         14
   Spy Museum Interviews: http://spymuseum.org/from-
    spy/spycast
     November 1, 2009 interview features Melissa Hathaway,
      former senior director for cyberspace for the National
      Security Council
     June 15, 2009 interview features Dr. Terry Gudaitis, former
      CIA operations officer and president of cyber intelligence
      company Cyveillance

   www.DHS.gov/Cyber     } for more on securing
   www.OnGuardOnline.gov } shared cyber networks

                             Cyber Threats                          15

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 

Andere mochten auch

Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014The eCore Group
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Project manager MBA cyber security
Project manager MBA cyber securityProject manager MBA cyber security
Project manager MBA cyber securityGarry Wood
 
World human population growth through history
World human population growth through historyWorld human population growth through history
World human population growth through historyBiswajit Das
 
Post-9/11 American Society
Post-9/11 American SocietyPost-9/11 American Society
Post-9/11 American Societyjdubrow2000
 
September 11th Impact on the World
September 11th Impact on the World September 11th Impact on the World
September 11th Impact on the World NIck Romano
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfareAmmad Ali
 
Customer perception @ bijjaragi motors mba project report
Customer perception @  bijjaragi motors mba project reportCustomer perception @  bijjaragi motors mba project report
Customer perception @ bijjaragi motors mba project reportBabasab Patil
 
Terrorism & its impat on international business
Terrorism & its impat on international businessTerrorism & its impat on international business
Terrorism & its impat on international businessAnkur Srivastava
 
Globalisation, Environment And Business
Globalisation, Environment And BusinessGlobalisation, Environment And Business
Globalisation, Environment And BusinessPeter Cullen
 
Effect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economyEffect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economyNitin Verma
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 

Andere mochten auch (20)

Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Project manager MBA cyber security
Project manager MBA cyber securityProject manager MBA cyber security
Project manager MBA cyber security
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
World human population growth through history
World human population growth through historyWorld human population growth through history
World human population growth through history
 
Post-9/11 American Society
Post-9/11 American SocietyPost-9/11 American Society
Post-9/11 American Society
 
September 11th Impact on the World
September 11th Impact on the World September 11th Impact on the World
September 11th Impact on the World
 
Pbl
PblPbl
Pbl
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Customer perception @ bijjaragi motors mba project report
Customer perception @  bijjaragi motors mba project reportCustomer perception @  bijjaragi motors mba project report
Customer perception @ bijjaragi motors mba project report
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Terrorism & its impat on international business
Terrorism & its impat on international businessTerrorism & its impat on international business
Terrorism & its impat on international business
 
Globalisation, Environment And Business
Globalisation, Environment And BusinessGlobalisation, Environment And Business
Globalisation, Environment And Business
 
Effect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economyEffect of terrorism-and-disaster-on-economy
Effect of terrorism-and-disaster-on-economy
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

Ähnlich wie Cyber threats

cyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptxcyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptxmalik681299
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdfezzi552
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 

Ähnlich wie Cyber threats (20)

cyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptxcyberthreats-111024103826-phpapp01.pptx
cyberthreats-111024103826-phpapp01.pptx
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Exp r35
Exp r35Exp r35
Exp r35
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf
 
China Cyber
China CyberChina Cyber
China Cyber
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber War
Cyber WarCyber War
Cyber War
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 

Kürzlich hochgeladen

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Kürzlich hochgeladen (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Cyber threats

  • 2. At the end of this lesson, the student should be able to:  Define cyberterrorism and cyberwarfare;  Identify five types of cyber attacks and understand the damage that cyber attacks can inflict;  Discuss several recent examples of cyber attacks;  Identify and explain the roles of two organizations involved in defending US cyberspace. Counterintelligence 2
  • 3. “The use of computer networks to shut down critical infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Source: Center for Strategic and International Studies) Cyber Threats 3
  • 4. Information war “The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories.” (Source: American Heritage New Dictionary) Cyber Threats 4
  • 5. Trojan Horse: A computer program that conceals harmful code. A Trojan horse usually masquerades as a useful program that a user would wish to execute.  Virus: A program that infects computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to affect other files. Unlike a computer worm, a virus requires human involvement (usually unwitting) to propagate. Cyber Threats 5
  • 6. Phishing: Using emails and websites designed to look like those of legitimate businesses/government agencies to deceive internet users into disclosing personal data, e.g. bank and financial account information and passwords.  DoS (Denial of Service): A method of attack from a single source that denise system access to legitimate users by overwhelming the target computer with messages and blocking legitimate traffic. It can prevent a system from being able to exchange data with other systems of use the internet. Cyber Threats 6
  • 7. Distributed Denial of Service (DDoS): A variant of the DoS attack that uses a coordinated attack from a distributed system of computers rather than from a single source. It often makes use of worms to spread to multiple computers that can then attack the target. Counterintelligence 7
  • 8. Titan Rain (2003+)  Series of coordinated attacks on US computers  Thought to be Chinese in origin  NASA, Lockheed Martin, and other vital organizations penetrated Counterintelligence 8
  • 9. Estonia, April 2007  DDoS attack against Estonian banks, media and government  Coincided with major civil unrest by Russian nationals Cyber Threats 9
  • 10. GhostNet  Chinese cyberespionage network  At least 103 countries penetrated  Searches computers and emails, then turns on webcams and microphones to record any conversations within range Counterintelligence 10
  • 12. Created in 2006  Housed within DHS  “responsible for enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure” Counterintelligence 12
  • 13. Created in June 2009  Began operations in May 2010  Part of the US Strategic Command, involving military units from the US Army, Navy, Air Force and Marines  Directed by General Keith B. Alexander (also head of NSA) Cyber Threats 13
  • 14. Plans, coordinates, integrates, synchronizes and conducts activities to:  Direct the operations and defense of specified DoD information networks  Prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. Counterintelligence 14
  • 15. Spy Museum Interviews: http://spymuseum.org/from- spy/spycast  November 1, 2009 interview features Melissa Hathaway, former senior director for cyberspace for the National Security Council  June 15, 2009 interview features Dr. Terry Gudaitis, former CIA operations officer and president of cyber intelligence company Cyveillance  www.DHS.gov/Cyber } for more on securing  www.OnGuardOnline.gov } shared cyber networks Cyber Threats 15