Cyber terroristism
-
Upload
nur-athirah-ahmad-zainee -
Category
Technology
-
view
622 -
download
0
Transcript of Cyber terroristism
NUR ATHIRAH BINTI AHMAD ZAINEEBM 111 5F
2010288848
CYBER TERRORISTISM
Cyber terroristism ?Action that varied as
data and hacking , planning
an cyber attacks , causing
violence or attacking
information systems by
cyber terrorists
cyber terrorist ?
attackers towards
unlawful attacks
against computer ,
network and
information system
WHY CYBER TERRORISTISM
CAN BE THREAT ???
according to the Institute for Security
Technology studies at Darmouth College,
cyber terroristism now pose a significant
threat and cyber attacks are increasing
in frequency, scope and sophistication.
US Commission on Critical
Infrastructure Protection
Notes noted that neighbouring
countries offer o protection
against cyber terroristism
ON YOUR COMPUTER SCRENE !Without notice it , you had been a victims
of cyber terroristism
Most activist hackers!
Anonymous
Cyber terroristism INCREASE cyber crime !
Why cyber terroristism
occur ?Has cyber terroristism actually occur ?
Cyber Terrorism Cannot DAMAGE Anybody And Can Not Made
Anyone DIED !
According To Desauza And Hesgen (2003), Cyber Terrorism is
REAL AND HARMFUL
Preventing Cyber Terrorism
Form of computer crime or misuse
Unauthorized, delibrate and
internally recognizable misuse
of assests of local information system
by individual (Straub , 1986, p.27)
Computer Crime / Misuse
Koung(1992), establish a taxonomy distinguish between the various sources of misuse
Legitimate access to the information system
Without refers to individuals not employed by organization
Having privileged access to the
information system
Without refers to collision between
external and internal personnel of either a non technical nature
or not
Model of computer security
Quantity of the different of computer security have been planned within the literature .
Bell-lapadula ModelBiba ModelClark Wilson Model
all these model work with CIA framework to stop misuse by examining individual behavior
Work out with CIA framework
CIA MODEL(Confidentialit
y, Integrity, Availability)
defending data confidentiality and reliability
based on references disciplines of psychological & criminology
recommend some protection against cyber terrorism
goal oriented of this model are limited for defending organizations against computer misuse.
Behavioral model Attitude toward the
behaviour
Perceived behavioral control
Intentions Subjective norms Behavior
Straub’s computer security model(Straub,1986)
First layer : deterrents which policies of acceptable or unacceptable uses of IS
second layer : active measure (preventives) such as password and
encryption designed to block intrusions
Third layer : detectives designed to detect misuses after
that occur so recovery process can take place
Cyber terrorism also give huge impact on consumer buying pattern
Negative impacts on internet security and
consumer buying purchase pattern
Impacts on trust between buyer and seller transactions
negative impacts on internet security and
consumer buying purchase pattern
Analyses of recent customer surveys have suggested that while many view the internet as a marketing channel valued for its convenience and ease of use for shopping, security and privacy issues are very influential on decisions to buy online
(smith and rupp, 2002a,b)
95 % of US consumers polled in a Gartner Group Survey
indicated concerns about privacy and security when making online purchases
(saban et al , 2002)
Impacts on trust between buyer and
seller transactions
Social psychologist define trust as an expectation about the behavior of others in transactions, focusing on the contextual factors that enhance or inhibit the development and maintenance of trust.
(grabner-kracturer,2002,p.44)
..REFERENCES..
Foltz, C. B. (2004). Information Management & Computer Security. cyberterrorism,computer crime and reality , 154-165.
Smith, A. D. (2004). Online Information Review. cybercriminal impacts on online business and consumer , 224-234.