Você está na página 1de 13

Project Report 2018-19 A study on cyber terrorism

TABLE OF CONTENTS

CHAPTER TITLE PAGE NO.

1 INTRODUCTION 2
• INTRODUCTION 3
2 RESERCH METHODOLOGY 5

3 DATA ANALIYSIS 7

4 FINDINGS,SUGGESTIONS&CONCLUSION 9
• FINDINGS 10
• SUGGESTIONS 10
• CONCLUSION 11
BIBLOGRAPHY 12

MES Kuttipuram Page 1 Department of MBA


Project Report 2018-19 A study on cyber terrorism

CHAPTER 1
INTRODUCTION

MES Kuttipuram Page 2 Department of MBA


Project Report 2018-19 A study on cyber terrorism

INTRODUCTION

As the use of internet is increasing day by day, traditional concept and methods of
terrorism have taken new dimensions. Tomorrow’s terrorist may be able to do more damage
with a keyboard than with a bomb. Individual or groups can use the anonymity afforded by
cyberspace to threaten citizen, specific groups, communities and even the countries. Cyber
terrorism is a phrase used to describe the use of internet based attacks in terrorist activities,
including acts of deliberate, large –scale disruption of computers attached to the internet, by
the means of tools such as computer viruses.

There are double different effects of cyber terrorism. One is financial damage. Cyber
terrorism doesn’t just do damage to one person, but a mass amount of people at one time.
Since cyber terrorism can destroy effects the economy so much it can weak in one’s country
making its defense system not as strong to other terrorist attacks. Cyber terrorism can destroy
a nation, financially and all its security. Also, it can interrupt electrical systems and can lead
to potential death. Some people don’t think it’s very serious because they don’t get nervous
but in reality it could ruin a nation and kill a mass amount of people. The affects are very
serious and even though a bomb isn’t thrown or a plane isn’t flown through buildings it can
still be a very serious.

Features of Cyber Terrorism

• Difficulty identifying attackers: It remains difficult to determine the identity of the


initiators of most cyber attacks
• Lack of boundaries: Attacks can originate from anywhere in the world and from
multiple locations simultaneously.
• Speed of Development: The time between the discovery of a new vulnerability and
the emergence of the new tool or techniques that exploits the vulnerability is getting
shorter
• Low cost of Tools: The technology employed in attacks is simple to use, inexpensive,
and widely available.
• Automated methods: The methods of attack have become automated and more
sophisticated, resulting in greater damage from a single attack.

MES Kuttipuram Page 3 Department of MBA


Project Report 2018-19 A study on cyber terrorism

Examples of Cyber Terrorism

• Hacking into computer systems.


• Introducing viruses to vulnerable networks.
• Website Defacing.
• Denial-of-Service (DoS) attacks.
• Terroristic threats made via e-mail.

Types of Cyber Terrorism

• Simple Unstructured: This method doesn’t do much because it can’t entry out as
much information. Example: data remove
• Advanced Structured: This method has multiple systems and it has more control,
freedom and creativity towards the attack. Example: banking robbery, ATM
failure.
• Complex Co-ordinated: This method has intense hacking tools and is highly
capable of target analysis, command, control and learning capability. Example:
Airline crash, Building crash, System down.

Pure cyber terrorism

Pure cyber terrorism refers to terrorism activity primarily in the virtual space. There are
multiple ways of meeting and communicating anonymously with like-minded people over
internet. To launch a cyber-terrorism attack does not require any physical resources like
muscular power, dangerous weapon or large amount of money. The only required things are
knowledge, computer, internet and some hacking software which can be used multiple times.

According to The National Conference of State Legislatures (NCSL), “Pure cyber


terrorism is the use of information technology by terrorist groups and individuals to further
their agenda. This can be include use of information technology to organize and execute
attacks against networks, computer systems and telecommunication infrastructures or for
exchanging information or making threats electronically. Examples are hacking in to
computer systems, introducing viruses in to vulnerable networks, website defacing, denial-of-
service attacks or terroristic threats made via electronic communication.”

MES Kuttipuram Page 4 Department of MBA


Project Report 2018-19 A study on cyber terrorism

CHAPTER 2

RESEARCH METHODOLOGY

MES Kuttipuram Page 5 Department of MBA


Project Report 2018-19 A study on cyber terrorism

RESEARCH METHODOLOGY

Research means a search for facts-answers to questions and solutions to problems. It


is purposive investigation. A research can be defined as a scientific and systematic search for
pertinent information on specified topic. The data collected for analyses is in secondary
manner.

OBJECTIVES OF THE STUDY

• The project aims at understanding the term Cyber Terrorism.


• To understand the effect of cyber terrorism in various sectors.

SOURCE OF DATA COLLECTION

SECONDARY DATA

Secondary data for this study was collected to a small extent going through internet,
files, etc. Various documents, journals, articles and reports were reviewed.

MES Kuttipuram Page 6 Department of MBA


Project Report 2018-19 A study on cyber terrorism

CHAPTER 3
DATA ANALYSIS

MES Kuttipuram Page 7 Department of MBA


Project Report 2018-19 A study on cyber terrorism

DATA ANALYSIS
Cyber Security attacks
• The first cyber-attack began 1988 with good intentions and ended with good
intentions and ended with unexpected consequences. It is a program to access the size
of the internet.
• In the second half of 2009, the Chinese Google launched three years earlier suffered
from a series of cyber-attack known as Operation Aurora; the attack stole intellectual
property from Google.
• Heartbleed wasn’t a virus it was a bug that got mistakingly written into OpenSSL.
This allowed hackers to create a gateway into database.
• In 2017 a new game called BlueWhale is a suicide game where players is given
various task.
• 17million Zomato user’s data stolen and put on the dark net for sales.
• Reliance jio Data leaked an unauthorized access into jio database. Data excludes
sensitive details like aadhaar details or PAN numbers.
• The Trojan steals banking information by using man in the browser keystroke logging
and form grabbing method to steal credentials.74000 websites including
bankofamerica.com, NASA.gov, ABC.com and amazon.com believed to be infected
by zesus Trojan.
• A daring cyber-attack was carried in August 2018 on Cosmo Bank’s Pune branch.
Hacker wiped out money and transferred it to a Hong Kong situated bank by hacking
server of Cosmo Bank. It is a malware attack.
• ATM system hacked in Canara bank Kolkata. The hacker used skimming devices on
ATMs to steal the information of debit card holders.
• Over 22000 websites were hacked between the months of April 2017 and January
2018. As per the Indian Computer Emergency Response Team, over 493 websites
were affected by malware.
• Adobe announced in October 2013 the massive hacking of its IT infrastructure.
Personal information of 2.9 million accounts was stolen. To access the information,
the hackers took advantage of a security breach at the publishers, specifically related
to security practices around passwords. The stolen passwords had been encrypted
instead of being chopped as recommended.

MES Kuttipuram Page 8 Department of MBA


Project Report 2018-19 A study on cyber terrorism

CHAPTER 4
FINDINGS, SUGGESTIONS & CONCLUSION

MES Kuttipuram Page 9 Department of MBA


Project Report 2018-19 A study on cyber terrorism

FINDINGS

• The first cyber-attack is by Morris Worm. The program would crawl the web, install
itself on other computers, and then count how many copies it made. It was the denial
of service attack.
• Operation Aurora aimed to dozens of other organization, of which Adobe Systems,
juniper Networks and Rackspace have publicity confirmed that they were targeted.
According to media reports, yahoo, Symantec, Northrop Grumman, Morgan Stanley
and Dow Chemical were also among the targets.
• The data obtained by a heartbleed attack may include unencrypted exchanges between
TLS parties likely to be confidential, including any form post data in user’s requests.
The confidential data include authentication secrets such as session cookies and
passwords, which might allow attacker to impersonate user of the service.
• When blue whale game installed it take all the information from our mobile and force
the victim for playing the game.
• Zomato hackers used hashing algorithms. Password hashing is a encryption technique
usually used for large online user database.
• The fraudsters created a proxy switch to interact with the VISA and Rupay payment
gateway. The malware attack on the switching system.
• Hacker used skimming devices on ATMs to steal the information. It shows that lack
of security system in ATMs.
• Majority of the website is affected by malware propagation including 114 websites
run by government. The attackers were intended to gather information about the
services and details of the users in their network

SUGGESTIONS

• By rebooting the system we can stop the Morris worm attack and this deleted all
traces of it.
• For reducing the operation aurora attack use the most recent version of your browser.
• Solution for heartbleed attack are upgrade your server to the latest version of
openSSL and to rekey your certificates.

MES Kuttipuram Page 10 Department of MBA


Project Report 2018-19 A study on cyber terrorism

• Hardening of the security systems by limiting its functions and performance only to
authorize people .any unauthorized access to the network should immediately set an
alarm to block all the access to the bank’s network.
• Enhancement of the security features in ATM and ATM monitoring system can
prevent any misuse of data.
• Using more secure firewall for network and server which can block any unauthorized
access from outside the network

CONCLUSION
From the study on the topic cyber terrorism, I understood that, the cyber-
attacks and its impact. The population of digital devices, which form the first line of
vulnerability to a cyber-attack, is growing rapidly. 97% IT managers admitted that
security expertise is one of the greatest issues in India. IT managers are more likely to
catch cyber criminals on their organization’s server and networks than anywhere else
say the survey. Security is one of the major factors in every business.
Cyber-terrorism can do possible serious damages to various aspects of our
lives. It is even scarier that terrorism is so difficult to catch and track and prosecute.
Emergent nature of the digital economy, cyber tools, and the capabilities
of our own adversaries require a repeated reassessment of cyber-attack
over time. A greater depth of understanding and threat assessment will be
gained through continued collaboration between Pool Re and the
Cambridge Centre for Risk Studies in the coming years

MES Kuttipuram Page 11 Department of MBA


Project Report 2018-19 A study on cyber terrorism

CHAPTER 7
BIBLIOGRAPHY

MES Kuttipuram Page 12 Department of MBA


Project Report 2018-19 A study on cyber terrorism

BIBLIOGRAPHY

• www.jbs.cam.ac.uk/risk
• Cyber Terrorism Insurance Futures Project Lead by Simon Ruffle,
Tamara Evan
• Evan, T.; Leverett, E.; Ruffle, S. J.; Coburn, A. W.; Bourdeau, J.;
Gunaratna, R.; Ralph, D.; 2017. Cyber Terrorism: Assessment of the
Threat to Insurance; Cambridge Risk Framework series; Centre for Risk
Studies, University of Cambridge. Evan, T.; Leverett, E.; Ruffle, S. J.;
Coburn, A. W.; Bourdeau, J.; Gunaratna, R.; Ralph, D.; 2017. Cyber
Terrorism: Assessment of the Threat to Insurance; Cambridge Risk
Framework series; Centre for Risk Studies, University of Cambridge.
• www.wikipedia.com

MES Kuttipuram Page 13 Department of MBA