Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Cyber Terrorism
Hacker: someone who breaks into computers
Types of hackers
terrorist activities intended to damage or disrupt vital computer systems
by Jack Chiu, Lawrence Lin, Yash Sanghavi, & Adeline Tao
uses the Internet
uses computer viruses
these hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures
motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target.
State Sponsored Hackers:
they have limitless time and funding to target civilians, corporations, and governments.
corporations hire hackers to infiltrate the competition and steal trade secrets.
White Hat Hackers:
the "good guys" who are computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure.
Black Hat Hackers:
the "bad guys" who break into networks or computers, or create computer viruses.
a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites.
Major Viruses: Stuxnet (2009-2010), Conficker Virus (2009), agent.btz (2008), Zeus (2007), PoisonIvy (2005), MyDoom (2004), Fizzer (2003), Slammer (2003), Code Red (2001), Love Letter/I LOVE YOU (2000)
In Worchester, Massachusetts, a cyber attack disabled the computer system of the airport control tower.
in Sweden, a
cyber attack from jammed the 911 emergency telephone system in central Florida.
A cyber attack in Australia breached the waste management control system and released millions of gallons of raw sewage into a small town.
A cyber attack in Russia breached the computer system and was able to control the flow of natural gas through the pipelines.
In Estonia, there was a mass cyber attack where sites were flooded with internet traffic and nearly all government and bank networks were knocked offline.
Ways of attacking
hacked PSN, attacked Church of Scientology, HB Gary Federal, and Westbro Baptist Church
Masters of Deception:
stole credit card info, archrivals of LOD, arrested by the FBI
Legion of Doom:
founded by Lex Luthor, hacked major government websites
hacked into the systems of Bhabha Atomic Research Center, hacked sites of World Cup, Wimbledon, Hotel Ritz , Saudi Royal Family and Drew Barrymore
Red Hacker Alliance:
Chinese, 80,000 + members, largest in the world, attack on CNN (2008)
do not do much damage
more targets but not as intense
steal some info/ crash websites/ some identity theft
large attacks against large corporations/governments
national security risk
Level of risk/damage from attacks
trojan horse, viruses, scareware, BOTS, password crackers, keyloggers, malware, database attacks, phishing, spyware...
Do you consider cyber terrorism the same as other acts of terrorism (like bombings and shootings)?
If you think "yes" go to the right side of the room.
If you think "no" go to the left side of the room.
The people around you make up your debate team.
How should cyber terrorism be approached?
After watching the video, is cyber terrorism a real threat, or is it just posed as a threat?
Cold War attack on the USSR (1982)
CIA hacked into Siberian gas line
caused a major explosion using only code
Attack on Estonia (2007-2008)
-IMF insider trading
-Target credit cards
-2008 presidency campaign
Recent Occurences of Stealing
Done by breaking through the security of organization targeted and accessing information within the target's database
Mostly done through creating and distributing viruses. Viruses infect software, or programs that computers run. The infected software malfunctions and spreads the virus, infecting a whole computer and, if left unchecked, all computers connected to the infected one.
The US DoD charged the United States Strategic Command with combating cyberterrorism through the Joint Task Force-Global Network Operations.
The Chinese Defense Ministry created a team of thirty elite internet specialists called "Cyber Blue Team," or "Blue Army," to engage in cyber-defense operations.
May 2011 Israeli Prime Minister Benjamin Netanyahu established the National Internet Defense Taskforce to secure vital Israeli online infrastructure.
-Check for any infections (ie: scan your computer)
-Watch for any information being leaked
-Watch for any unknown programs being installed
-Watch database logs to see who is accessing what data
-Watch the firewall logs to know what kind of attacks are
happening and when.
Self Protection against attacks
National Steps to Security
Thanks for watching!
We hope you enjoyed!