Ethical hacking and countermeasures - phần 43 docx

47 143 0
Ethical hacking and countermeasures - phần 43 docx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Ehi l H ki d E t hi ca l H ac ki ng an d Countermeasures Vi6 V ers i on 6 Module XLIII Cyber Warfare- Hacking Al-Qaida and Terrorism News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.news.com/ News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.wired.com/ Module Objective This module will familiarize you with: • Cyber Terrorism Over Internet • Cyber-Warfare Attacks • A l- Q aeda Q • Why Terrorists Use Cyber Techniques • Cyber Support to Terrorist Operations • Cyber Threat to the Military • Electronic Jihad • Electronic Jihad EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Cyber Terrorism Over Cyber Support to Terrorist i Internet Operat i ons Cyber-Warfare Attacks Cyber Threat to the Military Al-Qaeda Electronic Jihad Why Terrorists Use Cyber Techni q ues EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited q Cyber Terrorism Over Internet According to http://www.cybercrimes.net/Terrorism, FBI defined Cyber terrorism as “ the use of computing resources defined Cyber terrorism as the use of computing resources against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives” Cyber-terrorism is the leveraging of a target's computer and information technology particularly via the Internet to cause information technology , particularly via the Internet , to cause physical, real-world harm,or severe disruption Cyerb terrorism can weaken countries economy; by doing this it can strip the country of its resources and make it more vulnerable to military attack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited vulnerable to military attack Cyber-Warfare Attacks Computer virus, logic bombs, and Trojan horse attacks Cyber Bullying • It is the use of electronic information and communication devices such as e-mail, instant messaging, text messages, blogs, mobile phones, pagers instant messages and defamatory websites pagers , instant messages , and defamatory websites to bully or harass the others Cyber Stalking • It is the use of the Internet or other electronic means to stalk someone Cyber Stalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • It is used with online harassment and online abuse Cyber-Warfare Attacks (cont’d) Web vandalism: • Attacks that deface WebPages, or denial-of-service attacks Propaganda: • Political messages can be spread through or to anyone by accessing Internet hi d • Classified information that is not handled securely can be intercepted and even modified making Gat h er i ng d ata: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited can be intercepted and even modified , making espionage possible from other side of the world Cyber-Warfare Attacks (cont’d) Distributed Denial-of-Service Attacks: • Large numbers of computers in one country launch a DoS attack against systems in another country • Military activities that use computers and satellites for Equipment disruption: • Military activities that use computers and satellites for co-ordination are at risk from this type of attack, putting soldiers at risk • Power, water, fuel, communications, commercial, and Attacking critical infrastructure: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited transportation are all vulnerable to a cyber attack [...]... http://www.telegraph.co.uk/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Net Attack Source: http://counterterrorismblog.org/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Al-Qaeda Al-Qaeda is Al Q d i an i t international alliance of I l i militant ti l lli f Islamic ilit t organizations founded in 1988 Al-Qaeda has attacked... al-Qaeda use cyberspace for communications, recruiting and communications recruiting, propaganda EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Cyber Support to Terrorist Operations (cont d) (cont’d) These operations include: p • • • • EC-Council Planning Recruitment Research R h Propaganda Copyright © by EC-Council All Rights Reserved Reproduction is Strictly... use of propaganda to enlist the support of their own public for jihad and to demoralize the enemy EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Cyber Threat to the Military Military is linked together through the Global Information Grid, computers, and computer networks Terrorists think that the military is the only vulnerability to command and control... http://www.theregister.co.uk/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited E.U Urged to Launch Coordinated Effort Against Cybercrime Source: http://www.networkworld.com/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Budget: Eye on Cyber-Terrorism Attacks Source: http://www.zdnet.com.au/ EC-Council Copyright © by EC-Council All... plan attacks, communicate with each other, and posture for future exploitation EC-Council Using steganography, they hide instructions, plans and pictures for their attacks in pictures and posted comments in chat rooms The i Th images and d instructions can only be opened using a “private key” or code known only t th recipients l to the i i t Copyright © by EC-Council All Rights Reserved Reproduction... Logistics operations Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Russia ‘hired botnets’ for Estonia Cyber War Cyber-War Source: http://www.itnews.com.au/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited NATO Threatens War with Russia Source: http://www.strategypage.com/ EC-Council Copyright © by EC-Council All Rights Reserved... h very easy and allows terrorists to obtain critical information Al Qaeda training manual recovered in Afghanistan states: • “Using public sources openly and without resorting to illegal means, it is possible to gather at least 80% of information about the enemy.” EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Propaganda Terrorists use propaganda to discredit... http://www.telegraph.co.uk/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Terror Web 2.0 Source: http://analysis.threatswatch.org/ EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Table 1: How Websites Support Objectives of terrorist/Extremist Groups EC-Council Copyright © by EC-Council All Rights Reserved Reproduction... d) EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d) (cont d) EC-Council Copyright © by EC-Council All Rights Reserved Reproduction is Strictly Prohibited Table 1: How Websites Support Objectives of terrorist/Extremist Groups (cont’d) (cont d) EC-Council Copyright © by EC-Council... Application includes a Windows-like interface that lets users choose from a list of target Web sites provided via the Al-jinan site, select an attack speed ( (weak, medium, or strong), and the click on the "attack" button , , g), The attacks from jihadists are interested in taking Web sites down and disrupting economies that they do not like EC-Council Copyright © by EC-Council All Rights Reserved Reproduction . E t hi ca l H ac ki ng an d Countermeasures Vi6 V ers i on 6 Module XLIII Cyber Warfare- Hacking Al-Qaida and Terrorism News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction. Stalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • It is used with online harassment and online abuse Cyber-Warfare Attacks (cont’d) Web vandalism: •. sophisticated network of individuals and Web sites worldwide worldwide Groups including al-Qaeda use cyberspace for communications recruiting and EC-Council Copyright © by EC-Council All Rights Reserved.

Ngày đăng: 02/08/2014, 11:20

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan