Professional Documents
Culture Documents
INFORMATION TECHNOLOGY - II
GROUP MEMBERS
HIMANSHU PATIL
LEENA MHAPANKAR
PRITI UKHEDA
PRANAV KAJARE
MEANING
• SECTION 66F OF THE IT ACT DEFINES ‘CYBER TERRORISM’ AS “ALL THOSE ACTS BY ANY PERSON
WITH AN INTENT TO CREATE THREAT TO THE UNITY, INTEGRITY, SOVEREIGNTY AND SECURITY OF
THE NATION OR CREATE TERROR IN MINDS OF PEOPLE OR SECTION OF PEOPLE BY WAY OF
DISRUPTING THE AUTHORISED ACCESS TO A COMPUTER RESOURCE OR GETTING ACCESS TO A
COMPUTER RESOURCE THROUGH UNAUTHORISED MEANS OR CAUSING DAMAGE TO
COMPUTER NETWORK.”
• IF THESE ACTS CAUSE INJURIES TO PERSONS, CAUSE THE DEATH OF ANY PERSON, DAMAGE OR
DESTRUCT ANY PROPERTY, CAUSE DISRUPTION OF ESSENTIAL SUPPLIES OR SERVICES, OR
NEGATIVELY AFFECT THE CRITICAL INFORMATION STRUCTURE, THEY BECOME PUNISHABLE IN
NATURE.
REASON FOR INCREASING CYBER TERRORISM
Spread of
terror in Lack of
large scale boundaries
Disability of Difficulty
Government identifying
functions attackers
Easy way to
create threat Low cost of
in people tools
mind
Easy to Automated
execute methods
FORMS OF CYBER TERRORISM
Privacy violation
Virus Worms
Troja
Logic
n
bombs
horse
Malware
Trap
doors
METHODS USE OF CYBER TERRORISM
•
Ransomware
•
Phishing
•
IP spoofing
•
Password Cracking
•
Use of Cryptography and steganography
•
Advanced Persistent Threat
•
Hacking
INCIDENCE OF CYBER TERRORISM
9/11/2001
United States
26/07/2008
Ahemdabad Bomb Blast
26/11/2008
Mumbai Attack
07/12/2010
Varanasi Blast
13/07/2011
Javeri Bazar Blast
INITIATIVES BY INDIA
According to IT Act 2000, Whoever commits or conspires to commit cyber terrorism shall
be punishable with imprisonment which may extend to imprisonment for life.”
The state has power to issue direction for interception or monitoring any data
Section 70-A and 70-B of IT Act,2000 cover both the investigatory process and the preventive
measures.
PREVENTION AND PRECAUTION
Be cautious
about Enforce On On
opening strong corporat industry
email password e level level
attachments
Keep Employ
antivirus intrusion On the
On a
software detection state and
global
installed systems national
and up to and level
date firewalls
level
CONCLUSION
• CYBER TERRORISM IS A BIGGEST THREAT WHICH IS SPREADING ON A GLOBAL SCALE WHICH IS REQUIRED TO
TAKE CARE BY WHOLE GLOBE AS A ONE UNIT.
• WITH COMBINATION OF KNOWLEDGE, RESPONSIBILITY AND EXPERTISE, A COUNTER- CYBER TERRORISM
TEAM CAN BUILD AN EFFECTIVE POLICY FOR PREVENTING CYBER TERRORIST INCIDENTS, MANAGING
THREATS AND RESPONDING TO CYBER- TERRORIST ACTS. SO NOW WE AGREE THE FACT THAT THE
TRADITIONAL CONCEPTS AND METHODS OF TERRORISM HAVE TAKEN NEW DIMENSIONS, WHICH ARE MORE
DEADLY AND DESTRUCTIVE IN NATURE.
• EVERY DAY NEW TECHNOLOGY HAS BEEN INTRODUCED WITH THE INTRODUCTION OF NEW TECHNOLOGY
NEW THREAT IS BEEN CREATED.
• ALL WE CAN DO AS A CITIZEN IS TO PROTECT OURSELVES BY PROTECTING OUR INFORMATION, WHO WE GIVE
IT TO AND HOW MUCH WE GIVE IT OUT.
REFERENCES
https://www.legalserviceindia.com/legal/article-378-cyber-
terrorism.html
http://www.legalservicesindia.com/article/1263/Cyber-Terrorism---
Quick-glance.html
techtarget
Ipleaders
THANK YOU