1 / 12

Cracking down on international cyberterrorism

Cracking down on international cyberterrorism. presentation BY SUNNY PATEL, DARIA POTAPOVA, RYAN RICHARDS. WHY CYBERTERRORISM IS IMPORTANT?. Cyber terrorism – the use of computing resources to imitate or coerce others. Hacking is the leading cause of data breaches;

shilah
Download Presentation

Cracking down on international cyberterrorism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cracking down on international cyberterrorism presentation BY SUNNY PATEL, DARIA POTAPOVA, RYAN RICHARDS

  2. WHY CYBERTERRORISM IS IMPORTANT? • Cyber terrorism – the use of computing resources to imitate or coerce others. • Hacking is the leading cause of data breaches; • Hacking groups are typically loosely affiliatedand rapidly expanding (which makes them very dangerous). They may include members from around the world and the number of members can range from tens to thousands; • Hacked data is irrelevant, biased and unreliable for auditors and accountants, which can potentially cost thousands to the companies.

  3. Why government’s role in cracking down cyber terrorism is important • Number of attacks by hackers is increasing – companies need to have effective systems of internal controls in place to prevent, detect and correct the attacks. • Companies need help in fighting those attacks. • Governments need to take responsibility and crack down on these cyber terrors.

  4. Anonymous • Emerged in 2003 on the imageboard 4chan online chat • Has no leaders, no hierarchical structure, and no geographical epicenter

  5. anonymous • Many members are motivated by freedom of information; • Famous for coordinating a range of disconnected actions from trolling to political protests; • Technically, the group is open to all and has no boundaries to participation;

  6. Lulzsec • Small in size, but performed significant damages; • Main reason for attacks is for lulz • Helped raise the public awareness about hackers • Lulzsec did not participate in selling hacked information

  7. Red hacker alliance • Largest hacking group in the world; • ‘an independent confederation of patriotic youth dedicated to defending China against perceived threats to national dignity’ • Was formed in response to the 1998 ethnic riots in Indonesia; • Many consider affiliation of Chinese government to RHA; • Since it’s origination RHA has been involved in at least five major cyber conflicts;

  8. Red hacker alliance • Attacks: • CNN • Against the US • Geological survey • NASA • Cornell University • More than 100 other US • government and business • sites

  9. Government responses to hackers • Properly train government personnel • Investment in research and development • Promote international cooperation among governments; crucial to fighting cyber terrorism worldwide. • Raise the security levels on critical accounting infrastructures, where the detection and response of an intrusion is immediate.

  10. Governments Response to hackers (cont’d) • United States • In 2008, then-President Bush created the Comprehensive National Cybersecurity Initiative (CNCI) • Establishing a front line defense by creating shared situational awareness to improve the government’s ability to prevent intrusions Europe • Europol, a European law enforcement agency • February 28, 2012, Europol arrested four individuals in a coordinated operation against hacktivists claiming to be part of the Anonymous collective

  11. Governments Response to hackers (cont’d) • Canada • Created Canada’s Cyber Security Strategy in 2010 • Purpose is to “invest in securing the Government of Canada systems, as well as partnering with other governments and with industry to ensure systems vital to Canadian security are protected.” China • Enacted new laws to fight cyber-terrorism despite controversies of China’s involvement • New law enacted prosecutes the “acquisition of computer system data or control of computer systems and prohibit supplying programs or tools for the purpose of intrusion into computer systems “

  12. Conclusion: • Few simple things to protect yourself from cyber-terrorism: • All company accounts should have passwords and the passwords should be difficult to unfold; • Network configurations should be changed when defects become known; • Check with venders for upgrades and patches; • Audit systems and check logs to help in detecting and tracing an intruder.

More Related