1 / 11

Cyber terrorism

Cyber terrorism. By: ashleigh austin and hunter burkett. What is cyber terrorism?.

Download Presentation

Cyber terrorism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber terrorism By: ashleighaustin and hunter burkett

  2. What is cyber terrorism? • Cyber terrorism is defined by the FBI as “any premeditated, politically motivated attack against information, computer systems, computer programs, network and data, which results in violence, disruption, or damage against non-combatant targets by sub-national groups or clandestine agents.” • Cyber attacks are often facilitated with readily available and easy to use software tools. These tools are often free online.

  3. Types of cyber terrorism • Computer Viruses • Computer program that spreads by inserting copies of itself into executable code or documents • Denial of Service Attacks • Assault on a network that floods it with so many additional requests or transactions that regular traffic is slowed or halted. • Software Vulnerability Exploitation • Software vulnerabilities are exploited with software containing code that can be used in a malicious fashion.

  4. What is affected? • According to the U.S. Commission of Critical Infrastructure Protection, possible targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. • This could allow terrorists to take out central parts of our nations networks.

  5. Potential cyberattacks • No catastrophic cyberterroristic attack has yet to occur • ZDNet cited worst-case scenarios • Train collisions by hijacking of operations • Hijacking of major utility networks • Attack on major water providers • Major financial networks • Cyberterroristic activities could have rippling effects throughout the world

  6. Likelihood of attacks • At this point, no catastrophic event has taken place • In 2002, CSIS noted that more than 3,000 vulnerabilities would need to be found within the public and private sector utility providers’ systems to take over major infrastructure entities • In 2006, US Dept. of Homeland Security issued a warning that al-Qaeda might be planning an attack against stock market and banking systems. • Attack never came

  7. Preventing cyberterroristic attacks • In 1997, President Clinton created Commission on Critical Information Protection • This created Presidential Decision Directive 63, which named 15 critical infrastructure sectors – still in use today. • Also encouraged establishment of Information Sharing and Analysis Centers to streamline federal, state, and local efforts. • After Sept. 11 attacks President signed executive order making Office of Homeland Security responsible for nation’s critical infrastructure protection • Dept. of Homeland Security took over responsibility on Nov. 25, 2002

  8. Recent government action • President Obama has taken a strong stand against cyber attacks • He signed a secret directive permitting military to act more aggressively in response to cyber attacks on nation’s private and govt. computer networks • Named Policy Directive 20 • Established broad and strict set of standards to guide the operation’s of federal agencies in confronting threats in cyberspace • Rumored that President Obama will sign an executive order, pushing stronger cybersecurityprotection • Senate failed to pass Cyber Security Act of 2012 for a second time • EO will implement at least some elements from CSA 2012. • EO will create council that will determine which govt. agencies regulate the sects of our nation’s critical infrastructure

  9. Recent government action, cont. • Govt. will also mandate: • Govt. information sharing about threats • Draft voluntary standards for critical infrastructure industries to follow • Strenghtencybersecurity oversight by regulatory agencies • Pressure private firms to increase security through federal standards

  10. conclusion • Cyberterrorism is a growing concern in today’s society. • According to Dr. Edward Maggio in his article Terrorism: Cyber Terrorism, “in the past minute there have been approximately 54,000 serious computer attacks reported to hackerwatch.org” • Businesses and policy makers, as well as us as individuals need to work to find a solution to not only combating but preventing this problem in the future.

  11. References • "9/11 10 Years Later: Protecting Critical Infrastructure." Homeland Security Digital Library (HSDL). The Naval Post Graduate School for Homeland Defense and Security, 23 Aug. 2011. Web. 02 Dec. 2012. <https://www.hsdl.org/hslog/?q=node/6318>. • Armerding, Taylor. "Demise of Cybersecurity Bill Means Executive Order on the Way." CSO. CXO Media, Inc., 21 Nov. 2012. Web. 02 Dec. 2012. <http://www.csoonline.com/article/721979/demise-of-cybersecurity-bill-means-executive-order-on-the-way>. • Arvidson, Erik. "What Does Cyberterrorism Affect?" EHow. Demand Media, 30 July 2011. Web. 02 Dec. 2012. <http://www.ehow.com/info_10011378_cyberterrorism-affect.html>. • Maggio, Edward J. "Survival Insights." Survival Insights. N.p., 07 Feb. 2012. Web. 27 Nov. 2012. <http://www.survivalinsights.com/modules.php?name=News>. • Nakashima, Ellen. "Obama Signs Secret Directive to Help Thwart Cyberattacks." Washington Post. The Washington Post, 14 Nov. 2012. Web. 02 Dec. 2012. <http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story.html>. • Roberts, Adam. "The Changing Faces of Terrorism." BBC News. BBC, 27 Aug. 2002. Web. 02 Dec. 2012. <http://www.bbc.co.uk/history/recent/sept_11/changing_faces_02.shtml>.

More Related