Presentation On Cyber Terrorism
Presentation On Cyber Terrorism
Presentation On Cyber Terrorism
ON
CYBER TERRORISM
SUBMITTED TO SUBMITTED BY
MS. SHEWTA GUPTA NIDHI KUMARI
LECTURER V.I.T.S. ROLL NO:- 0214IT081032
INFORMATION TECHNOLOGY
ABSTRACT
ACTION
There are an almost uncountable number of ways that the terrorist can use
the computer as a tool. Facilitating identity theft, computer viruses,
hacking, use of malware, destruction or manipulation of data all fall under
this category. These uses of the computer, when combined with ‘computer
as target’ form the ‘traditional’ picture of cyberterrorism. These will be
discussed in more detail later in the section Computers: The Weapon of the
Cyberterrorist.
TARGET
There are a large number of potential targets that involve, either directly or
indirectly, computers. Consider, for example, the impact of Personal
Identity Theft.
AFFILIATION
It is possible for a person to read all about a given cause and chat with
proponents of the cause without ever leaving the safety of his or her own
home. New recruits can thus become affiliated with a terrorist group, commit
to carrying out given actions, all without ever actually coming into contact with
another human being.
MOTIVATION
Political, social, and economic changes are the motivations present in real-
world terrorism. Combining a dependence on Internet-connected systems for
banking and Ecommerce with the ability of anyone with a desire and readily
available tool to disrupt these areas, results in a situation that is all too clear:
unless steps are taken to significantly reduce risks, disaster is inevitable.
Even
with the best risk reduction, there are still likely to be problems.
PURE CYBERTERRORISM
The concept of ‘pure’ cyberterrorism — that is, terrorism activities that are
carried out entirely (or primarily) — in the virtual world is an interesting one.
The Internet provides many different ways of anonymously meeting with
‘like minded’ individuals in a (comparatively) safe way.
THE NEW TERRORISM
I) Privacy violation:
The law of privacy is the recognition of the individual's right to be let alone
and to have his personal space inviolate. The right to privacy as an
independent and distinctive concept originated in the field of Tort law, under
which a new cause of action for damages resulting from unlawful invasion of
privacy was recognised.
II) Secret information appropriation and data
theft:
The information technology can be misused for appropriating the valuable
Government secrets and data of private individuals and the Government and
its agencies.
III) Distributed denial of services attack:
The cyber terrorists may also use the method of distributed denial of
services (DDOS) to overburden the Government and its agencies electronic
bases.
Examples