1. What is it? And what is its importance? 2. Cyber-Warfare:  ▪ is the use of computers and the Internet in conducting warfare in cyberspace. V.S. Information…
of 24
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
  • 1. What is it? And what is its importance?
  • 2. Cyber-Warfare:  ▪ is the use of computers and the Internet in conducting warfare in cyberspace. V.S. Information Security:  ▪ protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
  • 3. The ACTUAL tools used in Information Security
  • 4. Rand Report 1970  MULTICS  Computer Viruses, Worms, and Trojan Horses  Anti-virus Software  Encryption/Decryption 
  • 5. How much does Google really know about you?
  • 6. What you are searching for 1. What web pages you visit 2. What blogs you read – Google Reader 3. Your financial information – AdSense / 4. Google Checkout Strength / Popularity of your website – 5. Google Analytics / Google Page Creator
  • 7. 6. Who and what you’re emailing – Gmail 7. What’s on your PC – Google Desktop 8. Your research paper, bills, etc. – uploading documents to Google 9. Your schedule – Google Calendar 10. Your social network and interests – Google indexes (Orkut, Facebook, Digg)
  • 8. 11. When you’re going to get the flu – Google flu tracker 12. Where you and your friends are – Google Latitude / Google Maps 13. What you’re watching on You Tube – Google owns You Tube 14. What and where you study – Google Books, Scholar, and University 15. Everything you’re looking at online – Google Chrome
  • 9. 16. Your problems – searching Google for answers 17. Your medical issues – Google Health 18. Your home address – Google Maps, AdSense, or Checkout 19. Mobile number – SM, Google Mobile, and Gmail 20. How your voice sounds – Google Talk
  • 10. 21. What you, your friends and family look like and do – Picasa 22. Everything you do online – Google Secure Access encrypts your data 23. What you want to buy and have bought – product search and catalog 24. What you business is about – Adwords share information with Google 25. What’s important to you – Google Alerts
  • 11. Against Video Privacy Act?   Every video on You Tube, the judge required Google to turn over to Viacom the login name of every user who had watched it and the address of their computer (IP)  Viacom claims information will be safeguarded and will be used only to press charges against Google ($1 billion copyright suit)  Public afraid of information being used against them
  • 12. Identity Theft / Stalker / Target Ads   Full name  Hometown  School  Class schedule  Email  Phone Number  Picture  Religion  Activities / Interests
  • 13. 150 million users  Businesses can look at your Facebook  Check privacy settings   6738.stm
  • 14. Doomsday April 1st?  Conficker is a computer worm that exploits  the weaknesses in Microsoft’s Windows 12 million machines infected with software  code that will connect the infected machine it controls to a powerful computer known as botnet Microsoft announces a $250,000 reward for  information leading to the capture of the Conficker author
  • 15. “Perhaps the most obvious frightening aspect of Conficker is its clear potential to do harm. Perhaps in the best case, Conficker may be used as sustained and profitable platform for massive Internet fraud and theft. In the worst case, Conficker could be turned into a powerful offensive weapon for performing concerted information warfare attacks that could disrupt not just countries, but the Internet itself.” Phillip Porras - Research Director at SRI International
  • 16. Cyber Terrorism
  • 17. Cyber Warfare:   The term cyber-warfare has many manifestations, ranging between website vandalism, iWar (information warfare), to destroying a country's critical infrastructure! Government Vulnerability:   Large dependency on information platforms linked to the internet. Such as power grids, water, fuel, communications, and public transportation. They are all vulnerable to a cyber attack.  An example that highlights this is the Russian-Georgian war in 2008. Cyber Warfare still a relatively new type of war. Most  of the research is based on “potential-harm”.
  • 18. Cyber-war highlights:  ▪ Jordan's’ Techno power:  Those involved in cyber warfare have a vast amount of techno power. As these “hackers” can destroy a country from inside out in a short time, and with complete anonymity. The true manifestation of “power”. Or they can manipulate any corporation, steal money, the limits are endless. They can access anythign connected to cyber space. ▪ Marvin’s Experts:  The experts that can engage in cyber warfare are put above all others in the realm of the internet. Why?  ▪ Because they can. ▪ Power ▪ Contracted. ▪ Can sell skills to terrorist groups or governments for money.
  • 19. As the Internet becomes more pervasive in all areas of  human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Leveraging of a target's computers and  information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
  • 20. The targets usually consisted of normal individual  internet users 10 – 15 years ago. Now targets can be countries, large corporations, etc; as society became more “digital”. Are only developed countries open to attack?  ▪ Yes, the more developed countries are susceptible to cyber warfare. As most of the foundations of the country and population lie within the realms of communication based in cyberspace. ▪ Lesser developed countries can be effected just as much. Although it won’t hit the general population as hard. Future wars and terrorism will look to manipulate and  target foundations with no losses.
  • 21. On May 17, 2007 Estonia came under cyber attack. The  Estonian parliament, ministries, banks, and media were targeted. On first week of September 2007, The Pentagon and  various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies any involvement Georgian and Azerbaijani sites were attacked by hackers  during the 2008 South Ossetia War. The United States had come under attack from computers  and computer networks situated in China and Russia.
  • 22. Cyber-warfare is still developing. Small attacks have been made  and attempted, but there hasn’t been a “large-scale” cyber war. Still a war-type of the near future. The following examples are just potential threats: Can cripple a country  ▪ Inhibit or stop all communication that uses any technological medium ▪ Could take control of power, water, and other necessities ▪ Confidential documents/plans stolen ▪ Total Control over most technological platforms (including nuclear codes and access)… Cyber warfare in media: (Somewhat possible damages if it were to  occur on a large scale) ▪ Eagle Eye ▪ Die Hard 4
  • 23.   
  • Search
    Similar documents
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks