Académique Documents
Professionnel Documents
Culture Documents
Team Members
Monami Saha
Sakshi Shreya
Akash Sarkar
Pabitra Ghorai
Aritra Bhattacharyya
Table of Contents
Common Terms
Hacking : To gain access to a computer (file or network)
illegally or without authorization.
Cryptanalysis is the study of analyzing information systems in
order to study the hidden aspects of the systems. Cryptanalysis is
used to breach cryptographic security systems and gain access to
the contents of encrypted messages, even if the cryptographic key
is unknown.
Phishing is the illegal attempt to acquire sensitive information
such as usernames, passwords, and credit card details (and
sometimes, indirectly, money), often for malicious reasons, by
masquerading as a trustworthy entity in an
electronic communication .
IP spoofing.
Password Cracking.
Denial-of-service
attacks.
IP Spoofing
Refers to creation of IP packets with
forged source IP address with the
purpose of concealing the identity of
sender.
Mostly used in Denial-of-Service attacks.
Most effective in corporate networks
where users can log in without a
username or password.
Password Cracking
Password cracking can be implemented using
brute-force attacks, Trojan horse programs and IP
spoofing.
Password attacks usually refer to repeated
attempts to identify a user account and/or
password; these repeated attempts are called
brute-force attacks.
Ordinary desktop computers can test over a hundred million
passwords per second using password cracking tools that
run on a general purpose CPU and billions of passwords per
second using GPU-based password cracking tools.
Denial-of-Service attacks
Denial-of-service attacks focus on
making a service unavailable to intended
users.
2 forms of DoS attacks: those that crash
services and those that flood services.
One common attack method involves
saturating the target machine with
communications requests such that it
cannot respond to the traffic.
Availability of
Capability
1945
1955
1960
1970
1975
1985
Today
Precis
Cruise Missile
Computer
ion
Strategic
Invas
Nuclear Missiles
Guide
ion Weapons
ICBM & SLBM
Types of Cyber
Criminals
Code
hacker :They know computers inside
out. They can make the computer do nearly
anything they want it to.
Crackers: They break into computer
systems, operating systems and their security
is their favorite pastime
Cyber Pumps: They are masters of
cryptography
Phreakers : They combine their in-depth
knowledge of the Internet and mass
telecommunication systems.
Sabotage
$ 871,000
System Penetration
$ 901,500
Website Defacement
Misuse of public web
AppsFraud
Telecom
Unauthorized Access
Laptop Theft
Financial Fraud
Abuse of wireless
Network
Insider Net Abuse
Theft of Proprietary
info.
Denial of Service
Virus
$ 958,100
$ 2,747,000
$ 3,997,500
$ 4,278,205
$ 6,734,500
$ 7,670,500
$ 10,159,250
$ 10,601,055
$ 11,460,000
$ 26,064,050
$
55,053,90
0
Government
66,000
chemical
plants
Transportation
Insiders
Chemical
Electric
120,000 miles
of major rails
Water
Configuration
Banking
2 million miles
of pipelines
26,000 FDIC
institutions
Emergency
Services
nuclear plants
Telecom
Problems
300,000
production
sites
Waste Water
E-commerce
Natural
Gas
1,600 municipal
wastewater facilities
2 billion miles
of cable
80,000 Dams
CONCLUSION
Cyber terrorism is a scary concept for many reasons.
It can do possible serious damages to various aspects
of our lives. It is even scarier that cyber terrorism is
so difficult to catch and track and prosecute.
The information age has brought us many good
things, but along with those good things came some
bad things too.
All we can do as citizens is to protect ourselves by
protecting our information, who we give it to and how
much we give it out.
Our government is trying to do its part, so lets
support them and their efforts and stop this cyber
battle.
Thank YOU!