Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
Cyber warfare can take many forms, for many reasons and can be executed on a small or large scale. most cyber-attacks are criminal in nature.
AIM
To Give you a brief idea and enhance your knowledge about the development of cyber warfare capabilities of Sri Lanka defence forces
SEQUENCE
What is Cyber Warfare. Types of cyber crime. The cyber Warfare crimes in the world. The cyber attack on Sri Lankan government. SLCERT Conclusion.
Cyber warfare is Internet-based conflict involving politically motivated attacks on information and information systems.
Cyber warfare attacks can disable official websites and networks, disrupt or disable essential services. This is sometimes referred to as the fifth domain of the warfare next to the land, sea, air, and space.
7
10
ARMY CHIEF WARNS OF CYBER WAR The physical war waged for 30 years has come to an end, the warfare has not come to an end by eliminating terrorists from this country as the 'cyber war', the war on information highway, is still continuing.
"Strategic Dimensions of Cyber Warfare" Cyber Warfare Workshop, 2011.
12
SLCERT
HISTORY OF THE SLCERT. ADMINISTRATION STRUCTURE SLCERT.
13
SLCERT
VISION To be Sri Lankas flagship organization and trusted source of advice on threats and vulnerabilities to Information Systems through proactive prevention and effective action.
14
MISSION
15
SLCERT
Room 4-112, BMICH, Bauddhaloka Mawatha, Colombo 07, Sri Lanka. Tel : +94 11 269 1692 / 269 5749 / 267 9888 Fax : +94 11 269 1064 E-Mail : slcert@cert.gov.lk
16
SLCERT
RESPONSIVE SERVICES (Mainly Incident Handling)
Malware (Viruses, Trojans, Backdoors, etc) DoS Attack Fhishing System Compromise Hate/Threat Mail Identity/Information Theft
17
SLCERT
AWARENESS SERVICES Alerts on critical updates, vulnerabilities. Seminars & Conferences. Workshop. Knowledge Base. Consultancy Services. Technical Assessments.
18
19
HERE ARE FEW KEY THINGS TO REMEMBER TO PROTECT YOURSELF FROM CYBER-TERRORISM
All accounts should have passwords and the passwords should be unusual, difficult to guess. Change the network configuration when defects become know. Check with venders for upgrades and patches. Audit systems and check logs to help in detecting and tracing an intruder. If you are ever unsure about the safety of a site, or receive suspicious email from an unknown address, don't access it. It could be trouble.
20
CONCLUSION
Completely secure system. Our country is increasingly vulnerable to cyber attacks.
21
?
22
Thank You
23