2. INTRODUCTION
Distribution Denial of Service attack, disrupting services,
DNS attacks, uploading computer viruses, worms and
malwares, harassing individuals and companies,
fraudulent transactions
Just examples of what
hacktivist can do with just a
computer and internet
connection
Internet now offers genuine targets that will become
attractive to certain terrorist organisations.
In today’s world, computer, an
internet connection and few well-
aimed clicks can lead to
cyberterrorism.
3. Terrorism refer only to those violent acts which are intended
to create fear (terror); are perpetrated for a
religious, political or, ideological goal; and deliberately target
or disregard the safety of civilians.
Cyberspace refers to the global network of independent
information technology infrastructure, telecommunication
networks and computer processing systems in which online
communication takes place.
CYBERTERRORISM
4. DEFINING
CYBERTERRORISM
CYBERTERRORISM IS THE USE OF INTERNET BASED ATTACKS IN
TERRORIST ACTIVITIES, INCLUDING LARGE-SCALE DISRUPTING SERVICES,
ESPECIALLY PERSONAL COMPUTERS ATTACHED BY INTERNET
CONNECTION, BY THE MEANS OF TOOLS SUCH AS COMPUTER VIRUSES,
MALWARES, WORMS TROJANS ETC.
Cyberterrorims is convergence of
cyberspace and terrorism.
To qualify for cyberterrorism, an
attack should result in violence
against person or property, or at
least cause enough harm to
generate fear.
The use of computer network tools to
shutdown critical infrastructures like energy,
transportation etc. or to coerce or intimidate
government or civilian population is also
cyberterrorism.
5. The term cyberterrorism was first coined by Barry
Collin in 1980’s by saying “Protect yourself from the
Cyberterrorism”.
Dorothy E. Denning defines
cyberterrorism as:
Unlawful attacks and threats of attack against
computers, networks, and the information stored
therein when done to intimidate or coerce a
government or its people in furtherance of political or
social objective.
6. For any hacktivist, it is very cheap, speedy and straightforward to initiate attacks
against critical infrastructure.
Cost of personal computer
and internet access Less than a minute
Using freely available
intruder tools
It is costly, long term and intricate to take the steps needed to harden the
information infrastructure to make it less vulnerable to attack, and to facilitate in
responding more effectively and efficiently when attacks do happen.
International efforts and
funding
Research, development
and deployment
Technically and
politically
7. SOME ILLUSTRATIONS
In 1996, a computer hacker allegedly associated with the White
Supremacist movement temporarily disabled a Massachusetts ISP and
damaged part of the ISP's record keeping system. The ISP had attempted
to stop the hacker from sending out worldwide racist messages under the
ISP's name. The hacker signed off with the threat, "you have yet to see
true electronic terrorism. This is a promise."
In 1998, ethnic Tamil guerrillas swamped Sri Lankan
embassies with 800 e-mails a day over a two-week period. The
messages read "We are the Internet Black Tigers and we're
doing this to disrupt your communications." Intelligence
authorities characterized it as the first known attack by
terrorists against a country's computer systems.
India and Pakistan have emerged in a long-term dispute over Kashmir.
The dispute moved into cyberspace when pro-Pakistani hackers began
repeatedly attacking computers in India.
8. TOOLS AND
TECHNIQUES
Cyberterrorism flourishes on the development of
new technology. New tools and techniques are
invented almost daily for cyberterrorism. Some of
them are:
Viruses, Worms and Malwares
These are the basic tools for any cyber
attack. Hacktivist will hack into systems and
upload any virus or worm which can result in
system crash.
Internet and downloaded
applications are the major
sources of malwares
11. CONCLUSION
Cyberterrorism is evolving concept, and there
is possibility of critical damages to
infrastructure, networks and cyberspace, if
not taken seriously.
Cyberterrorism is a complex issue that is vital
for information security specialists and to some
extent the society to recognize. One must be
conscious of all of its characteristics in order to
better evaluate how and where the terrorists
are likely to attack our approach.