Professional Documents
Culture Documents
A
Seminar Report
On
An International Study on a Risk of Cyber
Terrorism
By
Suraj S. Rane
A
Seminar Report
on
An International Study on a Risk of Cyber
Terrorism
In partial fulfillment of requirements for the degree of
Bachelor of Technology
In
Computer Engineering
Submitted By
Suraj S. Rane
This is to certify that Third Year Seminar entitled “An International Study on a Risk of
Cyber Terrorism” has been submitted by Suraj Sunil Rane under my guidance in partial
fulfillment of the degree of Bachelor of Technology in Computer Engineering of Dr.
Babasaheb Ambedkar Technological University (DBATU), Jalgaon during the academic year
2019-2020 (Semester-I).
Date:
Place: Jalgaon
Principal
KCES’s COEIT, Jalgaon
ACKNOWLEDGEMENT
I have taken efforts in this seminar. However, it would not have been possible without the
kind support and help of many individuals and institute. I would like to extend my sincere
thanks to all of them.
I would like to express my special gratitude and thanks to Head of Computer Department
Mrs.M.T.Kolhe for giving us such attention and time.
We are highly indebted to, Mrs.Leena waghulde for their guidance and constant supervision
as well as for providing necessary information regarding the seminar and also for their
support in completing the seminar report.
Last but not least we wish to acknowledge my parents and friends for giving more strength
and encouragement.
Suraj S. Rane
ABSTRACT
Cyber terrorism has been a risk since the advent of the Internet. Technology has developed at
a rapid pace, and likewise, the risk and impact of cyber terrorism. It is pertinent that secure
and updated mechanisms are in place to mitigate the risk of cyber terrorism, with
international cooperation and collaboration to further enhance investigation and information
gathering. An International Study on the Risk Of Cyber Terrorism discusses mechanisms
such as security applications, security policies, comprehending education programs,
international co-operation, monitoring and Artificial Intelligence (AI) and monitoring, using
and disrupting approach (M.U.D). Implementations of all the mechanisms allows computer
network and systems to be less vulnerable and manages the risk of cyber terrorism because
each mechanisms possess separate functions for combating cyber terrorism. Various
initiatives has been introduced by respective bodies from all over the world in order to ensure
that the threat of cyber terrorism is controllable. However, the threat of cyber terrorism
continuous to increase due to the constant development of Internet-based platforms. Thus,
law enforcements, policies, practices and necessary measures should continue developing
contemporarily to the development of computer technology.
Keywords:- Cyber terrorism, Artificial Intelligence (AI), Monitoring, Using and Disrupting
(M.U.D).
INDEX
Abbreviations i
1 INTRODUCTION 1
1.1 Overview 2
1.2 Purpose 4
1.3 Scope 5
1.4 Summary 5
2 LITERATURE SURVEY 6
2.1 History 6
3 METHODOLOGY 8
4.1Technologies used 15
4.1.2 Actinometer 17
4.2Artificial intelligence 19
5.1 Advantages 28
5.2 Disadvantages 39
6 APPLICATION 30
Conclusion 31
Future Scope 32
Bibilography 33