You are on page 1of 14

CYBER TERRORISM

INFORMATION TECHNOLOGY - II

GROUP MEMBERS
HIMANSHU PATIL
LEENA MHAPANKAR
PRITI UKHEDA
PRANAV KAJARE
MEANING

CYBER TERRORISM IS CONVERGENCE OF CYBERSPACE AND TERRORISM. IT REFERS TO UNLAWFUL


ATTACKS AND THREATS OF ATTACKS AGAINST COMPUTERS, NETWORKS AND THE INFORMATION
STORED THEREIN WHEN DONE TO INTIMIDATE OR COERCE OF GOVERNMENT OR ITS PEOPLE IN
FURTHERANCE OF POLITICAL AND SOCIAL OBJECTIVE.

Tomorrow’s terrorist may be able to do More


damage with keyboard than With a bOmb.
DEFINITION AS PER INFORMATION
TECHNOLOGY ACT, 2000

• SECTION 66F OF THE IT ACT DEFINES ‘CYBER TERRORISM’ AS “ALL THOSE ACTS BY ANY PERSON
WITH AN INTENT TO CREATE THREAT TO THE UNITY, INTEGRITY, SOVEREIGNTY AND SECURITY OF
THE NATION OR CREATE TERROR IN MINDS OF PEOPLE OR SECTION OF PEOPLE BY WAY OF
DISRUPTING THE AUTHORISED ACCESS TO A COMPUTER RESOURCE OR GETTING ACCESS TO A
COMPUTER RESOURCE THROUGH UNAUTHORISED MEANS OR CAUSING DAMAGE TO
COMPUTER NETWORK.”
• IF THESE ACTS CAUSE INJURIES TO PERSONS, CAUSE THE DEATH OF ANY PERSON, DAMAGE OR
DESTRUCT ANY PROPERTY, CAUSE DISRUPTION OF ESSENTIAL SUPPLIES OR SERVICES, OR
NEGATIVELY AFFECT THE CRITICAL INFORMATION STRUCTURE, THEY BECOME PUNISHABLE IN
NATURE.
REASON FOR INCREASING CYBER TERRORISM

Spread of
terror in Lack of
large scale boundaries

Disability of Difficulty
Government identifying
functions attackers

Easy way to
create threat Low cost of
in people tools
mind

Easy to Automated
execute methods
FORMS OF CYBER TERRORISM

Privacy violation

Secret information appropriation


and data theft

Demolition of E-governance base

Distributed denial of services attack

Network damage and disruptions


TOOLS OF CYBER TERRORISM

Virus Worms

Troja
Logic
n
bombs
horse

Malware
Trap
doors
METHODS USE OF CYBER TERRORISM


Ransomware


Phishing


IP spoofing


Password Cracking


Use of Cryptography and steganography


Advanced Persistent Threat


Hacking
INCIDENCE OF CYBER TERRORISM

9/11/2001
United States

26/07/2008
Ahemdabad Bomb Blast

26/11/2008
Mumbai Attack

07/12/2010
Varanasi Blast

13/07/2011
Javeri Bazar Blast
INITIATIVES BY INDIA

Indian Computer Emergency Response Team

National Cyber Security Assurance Framework established by CERT-In

According to IT Act 2000, Whoever commits or conspires to commit cyber terrorism shall
be punishable with imprisonment which may extend to imprisonment for life.”

The state has power to issue direction for interception or monitoring any data

Section 70-A and 70-B of IT Act,2000 cover both the investigatory process and the preventive
measures.
PREVENTION AND PRECAUTION

Be cautious
about Enforce On On
opening strong corporat industry
email password e level level
attachments

Keep Employ
antivirus intrusion On the
On a
software detection state and
global
installed systems national
and up to and level
date firewalls
level
CONCLUSION

• CYBER TERRORISM IS A BIGGEST THREAT WHICH IS SPREADING ON A GLOBAL SCALE WHICH IS REQUIRED TO
TAKE CARE BY WHOLE GLOBE AS A ONE UNIT.
• WITH COMBINATION OF KNOWLEDGE, RESPONSIBILITY AND EXPERTISE, A COUNTER- CYBER TERRORISM
TEAM CAN BUILD AN EFFECTIVE POLICY FOR PREVENTING CYBER TERRORIST INCIDENTS, MANAGING
THREATS AND RESPONDING TO CYBER- TERRORIST ACTS. SO NOW WE AGREE THE FACT THAT THE
TRADITIONAL CONCEPTS AND METHODS OF TERRORISM HAVE TAKEN NEW DIMENSIONS, WHICH ARE MORE
DEADLY AND DESTRUCTIVE IN NATURE.
• EVERY DAY NEW TECHNOLOGY HAS BEEN INTRODUCED WITH THE INTRODUCTION OF NEW TECHNOLOGY
NEW THREAT IS BEEN CREATED.
• ALL WE CAN DO AS A CITIZEN IS TO PROTECT OURSELVES BY PROTECTING OUR INFORMATION, WHO WE GIVE
IT TO AND HOW MUCH WE GIVE IT OUT.
REFERENCES

https://www.legalserviceindia.com/legal/article-378-cyber-
terrorism.html

http://www.legalservicesindia.com/article/1263/Cyber-Terrorism---
Quick-glance.html

techtarget

Ipleaders
THANK YOU

You might also like