Cyber Terrorism

Views:
 
Category: Education
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

Cyber Terrorism By: Julie Klug:

Cyber Terrorism By: Julie Klug

As society advances in technology, we leave ourselves at greater risk of Cyber Terrorism. :

As society advances in technology, we leave ourselves at greater risk of Cyber Terrorism.

Who partakes in the act of cyber terrorism?:

Who partakes in the act of cyber terrorism? Terrorists- Anyone who terrorizes by using violence, threats, coercion, and/or intimidation as a way to instill fear and gain submission.

What is Cyber Terrorism?:

What is Cyber Terrorism? The definition according to the United States Federal Bureau of Investigation (FBI), cyber terrorism is any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”

Cases when the U.S. has fallen victim to Cyber Attacks?:

Cases when the U.S. has fallen victim to Cyber Attacks? In 2008, the United States experienced their most significant cyber attack yet. The sophistication and frequency of system breaches have worsened in the past ten years. Everyday now, “U.S. military and civilian networks are probed thousands of times and scanned millions of times.” -William Lynn

Where is Cyber crime committed?:

Where is Cyber crime committed? Cyber space Computer Systems Infrastructure I.E… Government Hospitals Banks Personal Computers

How does Cyber Terrorism work?:

How does Cyber Terrorism work? Hacking : To gain access to (a computer file or network) illegally or without authorization. Misinformation: To provide with incorrect information. Virus: A computer program that duplicates itself in a manner that is harmful to normal computer use. Most viruses work by attaching themselves to another program. The amount of damage varies; viruses may erase all data or do nothing but reproduce themselves. Worm: A malicious program that replicates itself until it fills all of the storage space on a drive or network. Definitions provided by thefreedictionay.com

How does Cyber Terrorism affect you and your future?:

How does Cyber Terrorism affect you and your future? Air traffic control towers or our airlines infrastructure could be hacked into. Banking systems could be violated and all of our money could be stolen. Bombs and other explosives could be set off by remote. Hospitals could lose all of their information. Learn Government secrets and plans The tampering of our water systems.

Why would a terrorist resort to cyber terrorism?:

Why would a terrorist resort to cyber terrorism? Anonymity Can cause a wide range of damage Deflate opponent’s facilities Diversion Dual attack Inexpensive Quick Remote control

Prevention & Protection::

Prevention & Protection: Be cautious about opening email attachments. Complete Software Updates Create difficult passwords Download anti-virus software Uninstall unused applications or services

Resources: :

Resources: http://dictionary.reference.com/browse/terrorism http://www.symantec.com/avcenter/reference/cyberterrorism.pdf http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain http://modernl.com/article/top-10-most-common-passwords http://www.ferret.com.au/n/10-ways-to-prevent-cyberterrorism-n707725 http://www.thefreedictionary.com