Вы находитесь на странице: 1из 13

Presentation on

An International Study on a Risk of Cyber Terrorism

Presented by
Suraj S. Rane
Guided by
Mrs.Leena Waghulde

Department of Computer Engineering,


KCES’s
College of Engineering and IT,Jalgaon,Maharashtra,India
11 November 2019 Department of Computer Engg, KCES’s COEIT, Jalgaon 1
CONTENT

 Introduction
Threats To Cyber Security
Current Cyber-Security Measure
Necessity Of Cyber Security
Recent Cyber Attack In India
Conclusions
References

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 2


INTRODUCTION

 “The science of today is the technology of tomorrow” says Edward


Teller. What do you mean by cyber security? Cyber security is
concerned with making cyberspace safe from threats, namely
cyber-threats.

 Internet is one of the fasted-growing areas of technical


infrastructure development. In today’s business environment,
disruptive technologies such as cloud computing such as could
computing.

 Today more than 80% of total commercial transactions are done


online, so this field required a high quality if security transparent
and best transactions.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 3


Threats To Cyber Security
 Threats to cyber security can be roughly divided into two general categories:
actions aimed at intended to damage or destroy cyber systems and actions that
seek to exploit the cyber infrastructure for unlawful or harmful purposes without
damaging or compromising that infrastructure.
 While some intrusions may not result in an immediate impact on the operations of
a cyber system as for example when a “TrojanHorse” infiltrates and establishes
itself in a computer, such intrusions are considered cyber attacks when they can
there after permits actions that destroy or degrade the computer’s capacities.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 4


Threats To Cyber Security
• Cyber exploitation includes using the Internet and other cyber
systems to commit fraud, to recruit and train terrorists, to violate
copyright and other rules limiting distribution of information to
convey controversial messages.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 5


Current Cyber-Security Measure

 The Internet currently is secured primarily through private regulatory


activity, defensive strategies and products, national laws and enforcement,
and some limited forms of international cooperation and regulation.
 Non-governmental entities play major roles in the cyber security arena.
Technical standards for the Internet (including current and next-generation
versions of the Internet Protocol) are developed and proposed by the
privately controlled Internet Engineering Task.
 The cyber attacks and exploitation developed through government-
sponsored research and coordination pursuant to cyber security plans.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 6


Current Cyber-Security Measure
 They recommend national laws to protect the sharing of information
about threats and attacks methods for government bodies, such as the
NSA, to cooperate with private entities in evaluating the source and
nature of cyber attacks; and more effective defences and responses.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 7


Intrusion Detection System(IDS)
 Attacks on the computer infrastructures are becoming an increasingly serious
problem.
 An intrusion is defined as any set of actions that attempt to compromise the
indignity, confidentiality or availability of a resource.
 Intrusion Detection is therefore required as an additional wall for protecting
systems. Intrusion detection is useful not only in detecting successful intrusions,
but also provides important information for timely counter measures.
 Intrusion detection is classified into two types: misuse and anomaly detection.
Misuse intrusion detection uses well-defined patterns of the attack that exploit
weaknesses in system and application software to identify the intrusions.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 8


Necessity Of Cyber Security
1. Protecting unauthorized access, disclosure, modification of the resources
of the system.
2. Security during on-line transactions regarding shopping, banking, railway
reservations and share markets.
3. Security of accounts while using social-networking sites against
hijacking.
4. Need of separate unit handling security of the organization.
5. Different organizations or missions attract different types of adversaries,
with different goals, and thus need different levels of preparedness.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 9


Recent Cyber Attack In India
 With 22 % jump in cyberattacks on Internet of Things (IoT) deployments in
the country, India was the most attacked nation in the IoT space last quarter.
 Among the 15 Indian cities from which data was gathered, Mumbai, New Delhi
and Bengaluru are attracting the maximum number of cyberattacks, revealed
the study by Bengaluru-headquartered telecom solutions provider Subex.
 During the quarter, the researchers registered 33,450 high-grade attacks, 500 of
which were very high sophistication.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 10


CONCLUSION

 Violations of human rights arise from the unlawful


collection and storage of personal data, the problems
associated with inaccurate personal data, or the abuse, or
unauthorized disclosure of such data.
 In this paper we also include the current threats, issues,
challenges and measures of IT sector in our society.
 With the increasing incidents of cyber attacks, building an
effective intrusion detection model with good accuracy
and real-time performance are essential.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 11


REFERENCES

1. Ravi Sharma, Study of Latest Emerging Trends on Cyber


Security and its challenges to Society. International Journal of
Scientific &Engineering Research, Volume 3, Issue 6,
June2012, ISSN 2229-5518.
2. Cyber security: challenges for society- literature review.
3. Cyber security Issues and Challenges: In Brief.
4. Cyber security threats challenges and opportunity.
5. Denning D., An Intrusion-Detection Model, IEEE Transactions
on Software Engineering, Vol. SE-13, No. 2, pp.222-232, 1987

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 12


Thank You.

11 November 2019 Department of Computer Engg, KCES’s COEIT,j algaon 13

Вам также может понравиться