Cyber Security Presentation.
Cyber Security Presentation.
SECURITY
Mateen Maqbool (23217)
Noor Fatima (23218)
Laiba (23227)
Aiman Rashid (23228)
Zunaira Munir (23230)
What is cyber terrorism?
Cyber terrorism is simply the use of computers and the Internet
connectivity between them in order to launch a terrorist attack. In short,
cyber terrorism is just like other forms of terrorism—it is only the milieu of
the attack that has changed.
Although it may not cause direct loss of life, cyber terrorism can lead to
major economic damage, communication breakdowns, and infrastructure
disruption.
Actual Cases of Cyber Terrorism
Case # 01
Example:-
An example is provided with Russia’s cyber attacks on Ukraine in
2022, which were used to weaken infrastructure before military
invasion. This reflects the growing trend of combining cyber and
physical warfare.
Case # 02
Propaganda:-
Spreading fake or one-sided information
Trying to change how people think
Shared through the internet, news, and social media
Example: Spreading false news to gain support in war
Information Control:-
Controlling what information people can see
Hiding important details from the enemy
Example: Blocking the media or only showing selected news
Disinformation:-
Sending false information on purpose
Making messages look real but they are fake
Example: A secret message that says one thing but means
anotherQuote:“Communication without intelligence is
noise;intelligence without communication is useless.” — Gen.
Gray
Future Trends in Cyber Warfare
Cyber warfare is rapidly evolving, with new technologies and tactics
constantly emerging. This presentation will explore some of the key trends
shaping the future of cyber conflict. We will delve into the roles of machine
learning and artificial intelligence, and review both positive and negative
trends to watch.
By understanding these trends, we can better prepare for the changes and
opportunities that lie ahead in the realm of cyber security.
The Rise of Machine Learning in Cyber Warfare
• Increased Awareness
Organizations are becoming more aware of the importance of cyber security and
are investing more resources in protecting their systems and data.
• Improved Collaboration
There is increasing collaboration between governments, industry, and academia
to share threat intelligence and develop best practices.
• Advanced Technologies
New technologies, such as AI and machine learning, are being developed to
improve cyber defenses and enhance resilience
Negative Trends:
Escalating Cyber Threats
• Ransomware attacks
Increasing in frequency and sophistication
• State-sponsored attacks
Becoming more prevalent and aggressive
• Skills shortage
Difficult to find and retain qualified cyber security professionals
• IoT vulnerabilities
Creating new attack vectors
Defense against Cyber Terrorism:
2. Treat Cyber Crime More Seriously: Crimes done using computers (like hacking)
should be punished strictly, and such cases should be investigated properly just like
other serious crimes.
Example: Arrest of the 'Twitter Hack' Teen (2020)
3. Train Cyber security Experts for Law Enforcement: Instead of teaching police
officers a little bit of computer skills, it's better to train computer experts and bring
them into law enforcement to handle cybercrime. Experts can understand and stop
attacks better.
Example: In many countries, cybercrime investigation units (like NADRA’s Cyber
Security Department or FIA’s Cyber Crime Wing in Pakistan) include IT experts
who help police track and stop cyber criminals
4. Create a Shared Emergency Reporting System:
Build a system where companies and cyber security teams can share alerts and
updates if they face a cyber attack. This helps others to be prepared and respond
quickly if the same attack happens to them.
Example: HEC Cyber Alert Emails
5. Have a Recovery Plan for Lost Data: If hackers delete or damage your files, you
should have a backup or recovery system ready. This way, you can restore your data
easily and avoid major problems.
Example: Google’s Cloud Backup and Disaster Recovery System