Cyber terroristism

28
NUR ATHIRAH BINTI AHMAD ZAINEE BM 111 5F 2010288848 CYBER TERRORISTISM

Transcript of Cyber terroristism

Page 1: Cyber terroristism

NUR ATHIRAH BINTI AHMAD ZAINEEBM 111 5F

2010288848

CYBER TERRORISTISM

Page 2: Cyber terroristism

Cyber terroristism ?Action that varied as

data and hacking , planning

an cyber attacks , causing

violence or attacking

information systems by

cyber terrorists

Page 3: Cyber terroristism

cyber terrorist ?

attackers towards

unlawful attacks

against computer ,

network and

information system

Page 4: Cyber terroristism

WHY CYBER TERRORISTISM

CAN BE THREAT ???

Page 5: Cyber terroristism

according to the Institute for Security

Technology studies at Darmouth College,

cyber terroristism now pose a significant

threat and cyber attacks are increasing

in frequency, scope and sophistication.

Page 6: Cyber terroristism

US Commission on Critical

Infrastructure Protection

Notes noted that neighbouring

countries offer o protection

against cyber terroristism

Page 7: Cyber terroristism

ON YOUR COMPUTER SCRENE !Without notice it , you had been a victims

of cyber terroristism

Page 8: Cyber terroristism

Most activist hackers!

Anonymous

Page 9: Cyber terroristism

Cyber terroristism INCREASE cyber crime !

Page 10: Cyber terroristism
Page 11: Cyber terroristism

Why cyber terroristism

occur ?Has cyber terroristism actually occur ?

Page 12: Cyber terroristism

Cyber Terrorism Cannot DAMAGE Anybody And Can Not Made

Anyone DIED !

According To Desauza And Hesgen (2003), Cyber Terrorism is

REAL AND HARMFUL

Page 13: Cyber terroristism

Preventing Cyber Terrorism

Page 14: Cyber terroristism

Form of computer crime or misuse

Unauthorized, delibrate and

internally recognizable misuse

of assests of local information system

by individual (Straub , 1986, p.27)

Computer Crime / Misuse

Page 15: Cyber terroristism

Koung(1992), establish a taxonomy distinguish between the various sources of misuse

Legitimate access to the information system

Without refers to individuals not employed by organization

Having privileged access to the

information system

Without refers to collision between

external and internal personnel of either a non technical nature

or not

Page 16: Cyber terroristism

Model of computer security

Quantity of the different of computer security have been planned within the literature .

Bell-lapadula ModelBiba ModelClark Wilson Model

all these model work with CIA framework to stop misuse by examining individual behavior

Work out with CIA framework

Page 17: Cyber terroristism

CIA MODEL(Confidentialit

y, Integrity, Availability)

defending data confidentiality and reliability

based on references disciplines of psychological & criminology

recommend some protection against cyber terrorism

goal oriented of this model are limited for defending organizations against computer misuse.

Page 18: Cyber terroristism

Behavioral model Attitude toward the

behaviour

Perceived behavioral control

Intentions Subjective norms Behavior

Page 19: Cyber terroristism

Straub’s computer security model(Straub,1986)

First layer : deterrents which policies of acceptable or unacceptable uses of IS

second layer : active measure (preventives) such as password and

encryption designed to block intrusions

Third layer : detectives designed to detect misuses after

that occur so recovery process can take place

Page 20: Cyber terroristism

Cyber terrorism also give huge impact on consumer buying pattern

Negative impacts on internet security and

consumer buying purchase pattern

Impacts on trust between buyer and seller transactions

Page 21: Cyber terroristism

negative impacts on internet security and

consumer buying purchase pattern

Page 22: Cyber terroristism

Analyses of recent customer surveys have suggested that while many view the internet as a marketing channel valued for its convenience and ease of use for shopping, security and privacy issues are very influential on decisions to buy online

(smith and rupp, 2002a,b)

Page 23: Cyber terroristism

95 % of US consumers polled in a Gartner Group Survey

indicated concerns about privacy and security when making online purchases

(saban et al , 2002)

Page 24: Cyber terroristism
Page 25: Cyber terroristism

Impacts on trust between buyer and

seller transactions

Page 26: Cyber terroristism

Social psychologist define trust as an expectation about the behavior of others in transactions, focusing on the contextual factors that enhance or inhibit the development and maintenance of trust.

(grabner-kracturer,2002,p.44)

Page 27: Cyber terroristism

..REFERENCES..

Page 28: Cyber terroristism

Foltz, C. B. (2004). Information Management & Computer Security. cyberterrorism,computer crime and reality , 154-165.

Smith, A. D. (2004). Online Information Review. cybercriminal impacts on online business and consumer , 224-234.