Cyber Op Ration

Embed Size (px)

Citation preview

  • 7/28/2019 Cyber Op Ration

    1/15

    ALWAR INSTITUTE OF ENGINEERING AND TECHNOLOGY,ALWAR(RAJ.)Presentation on

    Cyber operations can supplement a war,

    but cannot be the war

    Submit to:- Presentation by:-Pro. Ashok Kumar Dubey Deepak Mandolia

    (H.O.D of I.T & C.S)

  • 7/28/2019 Cyber Op Ration

    2/15

    Contents:-

    Cyber war Define

    Cyber war as thread unrelated even and strategic attack

    Characteristics of cyber operation.

    Cyber warriors. Psychology of modern warfare and hacking

    form of cyber operation as a terrorism

    Critical infrastructures

    Direct and indirect cost implementations

    conclusion

  • 7/28/2019 Cyber Op Ration

    3/15

    Cyber war define :-

    Use of computing resources to intimidate coerce or

    harm people ,place or system in which we depend upon.According to the U.S. Federal Bureau of Investigation,

    cyber terrorism is any "premeditated, politicallymotivated attack against information, computer

    systems, computer programs, and data which results inviolence against non-combatant targets by sub-nationalgroups or clandestine agents."

    hacking with a body count.

    Section 66f.

  • 7/28/2019 Cyber Op Ration

    4/15

    Cyber war is the biggest threat for India today:-

    The next war that the country may have to usage

    terror will be on internet . The networkinfrastructure of country may be attacked anytime social network site.

    India may be the IT capital of the world, but veryfar from security issues are concerned the country

    is lagging far behind.

  • 7/28/2019 Cyber Op Ration

    5/15

    Unrelated even or strategic attack:-

    ATM failure.

    Power outages. Telephonic outages.

    World trade center .

    Airline crash.

    Oil refinery fire.

    Bridges down.

  • 7/28/2019 Cyber Op Ration

    6/15

    Characteristics of cyber operations as terrorism:-

    Cyber operations is safe and profitable.

    Act must have scale and publicity . Cyber operation are difficult to counter without the right

    expertise.

    Cyber operation are difficult to understand the mind of

    terrorist. Relatively anonymous.

    If he /she is loss today then in future terrorism will use thatinformation against you tomorrow.

  • 7/28/2019 Cyber Op Ration

    7/15

    Cyber warriors:-

    The cyber operation will make certain that the population of

    a nation will not able to eat or live . The people changes with protection of their nation will not

    have warning and will not be able to shut down the theseterrorism operations.

  • 7/28/2019 Cyber Op Ration

    8/15

    Psychology of modern warfare and hacking:-

    For fun(31.4%)

    Want to the best defacer(17.2%) No reason specified(14.7%)

    Political reasons(11.5%)

    Patriotism(10.9%)

    As a challenge (10.8%)

    Revenge(3.3%)

  • 7/28/2019 Cyber Op Ration

    9/15

    form of cyber operation as a terrorism :-

    Privacy violation

    Secret information appropriation and datatheft

    Demolition of e-governance base

    Distributed denial of services

  • 7/28/2019 Cyber Op Ration

    10/15

    Critical infrastructures:-

    Government operations

    Emergency services

    Telecommunications

    Electrical energyTransportation

    Banking and finance

    Water supply systemGas and oil storage

  • 7/28/2019 Cyber Op Ration

    11/15

    Direct cost implementations:-

    Loss of sales during the disruption

    Network delays ,intermittent access forbusiness user

    Loss of the intellectual propertyresearch

    pricing etcCost of the critical communication in time of

    the emergency

  • 7/28/2019 Cyber Op Ration

    12/15

    Indirect cost implications:-

    1. Loss of confidence in our financial system

    2. Tarnished relationship is public image globally.3. Strained business partner relationship domestic

    and internationally.

    4. Loss of the customer revenues for an individualgroup of the companies.

    5. Loss of trust in too government and companyindustry.

  • 7/28/2019 Cyber Op Ration

    13/15

    What can be do:-

    Coorperate and share intelligence among all agencies.

    Learn new technology The tool of the count the cyber terrorist must be real

    time and dynamic ,as the weapons will continue change.

    More building ,Network and desktop security a priority.

    Report instance of the cyber crime to the localenforcement agencies.

  • 7/28/2019 Cyber Op Ration

    14/15

    Conclusion:-

    The problem of the cyber terrorism is having varied fact anddimension.

    Its solution requires rigorous application of energy andresources

    Its must also because we have a tendency to make law whenthe problem at its zenith

  • 7/28/2019 Cyber Op Ration

    15/15

    THANK YOU