SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Cyberterrorism

Eric Minaker
CSCI263
11/13/14
Example of a Cyberterrorism Attack
●

Stock market attacked from out of country

●

Devastating to economy

●

Causes chaos

●

Can cause political tension

●

Is damaging to the entire state

●

Great example of a cyberterrorism attack
What is Cyberterrorism?
●
●

●

●

Keiran Hardy
Must involve intent to conduct the act and
to influence people or government
Must include some political, religious, or
ideological motive or purpose
Can include the bringing about of harm
What is Cyberterrorism?
●

●

●

Difference between cyberterrorism and
hacking
Hacking may be done for monetary gain or
recognition
Hacking generally affects a small portion of
the population
What is Cyberterrorism?
●

●

●

Cyberterrorism has a larger purpose than
hacking
It focuses on attacks that can damage
countries and governments, not individuals
Cyberterrorists may kill citizens or
dignitaries
History of Cyberterrorism
●

Originates from cybernetic, from Greek for
“the one who governs” and terrorism, from
the Latin for “to inspire fear”

●

Not much of a history, relatively new field

●

Legal definition
History of Cyberterrorism
●

UN's Ad Hoc Committee on Measures to Eliminate
International Terrorism

●

UN International Crime and Justice Research Institute

●

NATO's Cooperative Cyber Defense Center for Excellence

●

G8 Communiques

●

The International Telecommunications Union

●

The International Center for Conuterterrorism

●

INTERPOL

●

EUROPOL
History of Cyberterrorism
●
●

●

●

EU Convention on Cybercrime
Most significant international treaty in this
area, still doesn't mention cyberterrorism
It does define national and international
cybercrimes
And lays out procedural law and production
order for investigation of cybercrime
History of Cyberterrorism
●

●

No previous attacks defined as
cyberterrorism
Have been alleged cyberterrorism attacks
–

Titan Rain

–

Estonia attacks

–

Stuxnet
What Can Be Attacked?
●

Almost everything

●

Pacemakers

●

Other embedded medical devices

●

Vehicles

●

Smart home systems

●

Mobile devices
What Can Be Attacked?
●

Nuclear facilities and other infrastructure

●

Stuxnet

●

Devastating attacks, cutting off utilities and
damaging the economy

●

Can funnel money back to terrorist groups

●

International Space Station

●

Attacked multiple times
What Methods Are Being Used?
●

Worms
–

–

Code capable of copying itself and corrupting or
destroying system data

–
●

Stuxnet

–

●

Malware program that replicates itself in order to
spread to other computers

Common in botnets, used to infect many computers

Viruses

Trojan Horse
–

Program that breaches security while performing an
otherwise innocuous function

–

Could infect civilian or government systems
How Can We Defend?
●

Classic Counter-terrorism
–
–

●

Physical eliminating the threat
Tracking and investigating cybercrimes to
find further evidence

International Collaborations in Countering
Cyberterrorism
–

National police forces and legal systems
struggle

–

Conflicting interest of member-states
How Can We Defend?
●

Current Policies

●

Tallinn Manual (2013)
–

Initiated by NATO's Cyber Defense
Centre for Excellence

–

Identifies 95 black letter rules that
represent restatements of the law applied
in cyber context
How Can We Defend?
●

Current Policies

●

2012 Chicago Summit Declaration
–

Helped bring all NATO bodies under
centralized cyber protection

–

Created a rapid reaction team to assist
member states
How Can We Defend?
●

Current Policies

●

2011 Cyber Defense Policy
–

Confirms that cyber intrusions at the
member-state level must be handled
politically, not militarily
Careers in Cyberterrorism
●

United States
–
–

●

Annual growth of 15%

–

●

Currently 91,080 cybersecurity experts

Estimated to have 25,000,000 cybersecurity
experts currently

–

Pushing to have 500,000 cybersecurity experts
in the next five years

–

Currently has 556 experts

China

India
Conclusion
●
●

●

●

Cyberterrorism is more than just hacking
There have not been any official incidents
of cyberterrorism
As we develop new devices, they get
compromised
Any counter-cyberterrorism effort will have
to be a multi-national effort
Sources
●

A Multidisciplinary Conference on Cyberterrorism: Final Report
–

●

●

Networks and Netwars: The Future of Terror, Crime, and Militancy by John
Arquilla and David Ronfeldt
Cyberterrorism: How Real is the Threat?
–

●

●

http://dspace.cigilibrary.org/jspui/bitstream/123456789/15033/1/Cyberterrorism%20How%20Real%20Is%20the%20Threat.pdf?1

Cybersecurity & Algo Trading Most Happening Careers in the Field of
Management and IT
EU Conventions of Cybercrime
–

●

http://www.cyberterrorism-project.org/wp-content/uploads/2013/07/CTP-Conference-Report.pdf

http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm

Understanding Cyberterrorism
–

http://search.proquest.com/docview/1173888997?accountid=27857

Weitere ähnliche Inhalte

Was ist angesagt?

Manual SC Topico_A
Manual SC Topico_AManual SC Topico_A
Manual SC Topico_A
PREFEMUN
 
White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17
difordham
 
Sec4 express chapter1(managing peace and security)_transnational_terrorism
Sec4 express chapter1(managing  peace and security)_transnational_terrorismSec4 express chapter1(managing  peace and security)_transnational_terrorism
Sec4 express chapter1(managing peace and security)_transnational_terrorism
Adrian Peeris
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 

Was ist angesagt? (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
The FBI's War On Terror
The FBI's War On TerrorThe FBI's War On Terror
The FBI's War On Terror
 
Migration and securitisation mir507
Migration and securitisation mir507Migration and securitisation mir507
Migration and securitisation mir507
 
Manual SC Topico_A
Manual SC Topico_AManual SC Topico_A
Manual SC Topico_A
 
White7e ppt ch17
White7e ppt ch17White7e ppt ch17
White7e ppt ch17
 
Sec4 express chapter1(managing peace and security)_transnational_terrorism
Sec4 express chapter1(managing  peace and security)_transnational_terrorismSec4 express chapter1(managing  peace and security)_transnational_terrorism
Sec4 express chapter1(managing peace and security)_transnational_terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Global threat landscape
Global threat landscapeGlobal threat landscape
Global threat landscape
 
Small State Security Engagement
Small State Security EngagementSmall State Security Engagement
Small State Security Engagement
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Un security council protocols in papua new guinea
Un security council protocols in papua new guineaUn security council protocols in papua new guinea
Un security council protocols in papua new guinea
 
Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdiction
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 

Andere mochten auch

Lim JUS 394 Cyberterrorism
Lim JUS 394 CyberterrorismLim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
merlyna
 
Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)
Muhammad Yahaya
 
Power Point Soccer
Power Point SoccerPower Point Soccer
Power Point Soccer
mcongro
 
Researching genre
Researching genreResearching genre
Researching genre
leiajc
 
Presentation1 visual bee - visualbee
Presentation1   visual bee - visualbeePresentation1   visual bee - visualbee
Presentation1 visual bee - visualbee
BenjaminSSmith
 
Presentazione standard1
Presentazione standard1Presentazione standard1
Presentazione standard1
angelo1970
 
ครอบครัวของฉัน
ครอบครัวของฉันครอบครัวของฉัน
ครอบครัวของฉัน
Chanti Choolkonghor
 
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
Andrés Felipe Hernández Chocontá
 

Andere mochten auch (20)

Lim JUS 394 Cyberterrorism
Lim JUS 394 CyberterrorismLim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)Food chemistry 1 (m.s.m)
Food chemistry 1 (m.s.m)
 
Food chemistry
Food chemistryFood chemistry
Food chemistry
 
Sign Language in Communication
Sign Language in CommunicationSign Language in Communication
Sign Language in Communication
 
Deaf culture
Deaf cultureDeaf culture
Deaf culture
 
Sign Language
Sign LanguageSign Language
Sign Language
 
American sign language powerpoint
American sign language powerpointAmerican sign language powerpoint
American sign language powerpoint
 
Power Point Soccer
Power Point SoccerPower Point Soccer
Power Point Soccer
 
Researching genre
Researching genreResearching genre
Researching genre
 
Presentation1 visual bee - visualbee
Presentation1   visual bee - visualbeePresentation1   visual bee - visualbee
Presentation1 visual bee - visualbee
 
Give/Get Union Suisse Christmas 2013
Give/Get Union Suisse Christmas 2013Give/Get Union Suisse Christmas 2013
Give/Get Union Suisse Christmas 2013
 
Evaluation 3
Evaluation 3Evaluation 3
Evaluation 3
 
Presentazione standard1
Presentazione standard1Presentazione standard1
Presentazione standard1
 
Analysis of recruitment and selection process
Analysis of recruitment and selection processAnalysis of recruitment and selection process
Analysis of recruitment and selection process
 
Surrealism
SurrealismSurrealism
Surrealism
 
ครอบครัวของฉัน
ครอบครัวของฉันครอบครัวของฉัน
ครอบครัวของฉัน
 
That Hallowed Spot! Chattanooga's Confederate Cemetery
That Hallowed Spot! Chattanooga's Confederate CemeteryThat Hallowed Spot! Chattanooga's Confederate Cemetery
That Hallowed Spot! Chattanooga's Confederate Cemetery
 
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...Actividad 7 momento 2   construcción de ciudadanía y organizaciones sociales ...
Actividad 7 momento 2 construcción de ciudadanía y organizaciones sociales ...
 
NDC London 2013 - Mongo db for c# developers
NDC London 2013 - Mongo db for c# developersNDC London 2013 - Mongo db for c# developers
NDC London 2013 - Mongo db for c# developers
 

Ähnlich wie 263presentation

CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
Commonwealth Telecommunications Organisation
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
glendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
todd581
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 

Ähnlich wie 263presentation (20)

Chapter14
Chapter14Chapter14
Chapter14
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Terrorisim and Role of Security organizations
Terrorisim and Role of Security organizationsTerrorisim and Role of Security organizations
Terrorisim and Role of Security organizations
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
2.7 overview-on-intelligence-Steele on future
2.7 overview-on-intelligence-Steele on future2.7 overview-on-intelligence-Steele on future
2.7 overview-on-intelligence-Steele on future
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Cyber2
Cyber2Cyber2
Cyber2
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 

Kürzlich hochgeladen

{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 

Kürzlich hochgeladen (20)

Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
 
02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf02052024_First India Newspaper Jaipur.pdf
02052024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 

263presentation

  • 2. Example of a Cyberterrorism Attack ● Stock market attacked from out of country ● Devastating to economy ● Causes chaos ● Can cause political tension ● Is damaging to the entire state ● Great example of a cyberterrorism attack
  • 3. What is Cyberterrorism? ● ● ● ● Keiran Hardy Must involve intent to conduct the act and to influence people or government Must include some political, religious, or ideological motive or purpose Can include the bringing about of harm
  • 4. What is Cyberterrorism? ● ● ● Difference between cyberterrorism and hacking Hacking may be done for monetary gain or recognition Hacking generally affects a small portion of the population
  • 5. What is Cyberterrorism? ● ● ● Cyberterrorism has a larger purpose than hacking It focuses on attacks that can damage countries and governments, not individuals Cyberterrorists may kill citizens or dignitaries
  • 6. History of Cyberterrorism ● Originates from cybernetic, from Greek for “the one who governs” and terrorism, from the Latin for “to inspire fear” ● Not much of a history, relatively new field ● Legal definition
  • 7. History of Cyberterrorism ● UN's Ad Hoc Committee on Measures to Eliminate International Terrorism ● UN International Crime and Justice Research Institute ● NATO's Cooperative Cyber Defense Center for Excellence ● G8 Communiques ● The International Telecommunications Union ● The International Center for Conuterterrorism ● INTERPOL ● EUROPOL
  • 8. History of Cyberterrorism ● ● ● ● EU Convention on Cybercrime Most significant international treaty in this area, still doesn't mention cyberterrorism It does define national and international cybercrimes And lays out procedural law and production order for investigation of cybercrime
  • 9. History of Cyberterrorism ● ● No previous attacks defined as cyberterrorism Have been alleged cyberterrorism attacks – Titan Rain – Estonia attacks – Stuxnet
  • 10. What Can Be Attacked? ● Almost everything ● Pacemakers ● Other embedded medical devices ● Vehicles ● Smart home systems ● Mobile devices
  • 11. What Can Be Attacked? ● Nuclear facilities and other infrastructure ● Stuxnet ● Devastating attacks, cutting off utilities and damaging the economy ● Can funnel money back to terrorist groups ● International Space Station ● Attacked multiple times
  • 12. What Methods Are Being Used? ● Worms – – Code capable of copying itself and corrupting or destroying system data – ● Stuxnet – ● Malware program that replicates itself in order to spread to other computers Common in botnets, used to infect many computers Viruses Trojan Horse – Program that breaches security while performing an otherwise innocuous function – Could infect civilian or government systems
  • 13. How Can We Defend? ● Classic Counter-terrorism – – ● Physical eliminating the threat Tracking and investigating cybercrimes to find further evidence International Collaborations in Countering Cyberterrorism – National police forces and legal systems struggle – Conflicting interest of member-states
  • 14. How Can We Defend? ● Current Policies ● Tallinn Manual (2013) – Initiated by NATO's Cyber Defense Centre for Excellence – Identifies 95 black letter rules that represent restatements of the law applied in cyber context
  • 15. How Can We Defend? ● Current Policies ● 2012 Chicago Summit Declaration – Helped bring all NATO bodies under centralized cyber protection – Created a rapid reaction team to assist member states
  • 16. How Can We Defend? ● Current Policies ● 2011 Cyber Defense Policy – Confirms that cyber intrusions at the member-state level must be handled politically, not militarily
  • 17. Careers in Cyberterrorism ● United States – – ● Annual growth of 15% – ● Currently 91,080 cybersecurity experts Estimated to have 25,000,000 cybersecurity experts currently – Pushing to have 500,000 cybersecurity experts in the next five years – Currently has 556 experts China India
  • 18. Conclusion ● ● ● ● Cyberterrorism is more than just hacking There have not been any official incidents of cyberterrorism As we develop new devices, they get compromised Any counter-cyberterrorism effort will have to be a multi-national effort
  • 19. Sources ● A Multidisciplinary Conference on Cyberterrorism: Final Report – ● ● Networks and Netwars: The Future of Terror, Crime, and Militancy by John Arquilla and David Ronfeldt Cyberterrorism: How Real is the Threat? – ● ● http://dspace.cigilibrary.org/jspui/bitstream/123456789/15033/1/Cyberterrorism%20How%20Real%20Is%20the%20Threat.pdf?1 Cybersecurity & Algo Trading Most Happening Careers in the Field of Management and IT EU Conventions of Cybercrime – ● http://www.cyberterrorism-project.org/wp-content/uploads/2013/07/CTP-Conference-Report.pdf http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm Understanding Cyberterrorism – http://search.proquest.com/docview/1173888997?accountid=27857