SlideShare a Scribd company logo
CyberTerrorism JUS 394 Nick Messina
Objective To be able to determine which unlawful acts are actually considered CyberTerrorism. The United States’ susceptibility to CyberTerrorism
What is CyberTerrorism? Since the idea of CyberTerrorism is relatively new, its definitions continue to evolve, which is why there is no official definition of CyberTerrorism. It varies from… Stealing Data and hacking Planning terrorist attacks Causing violence Or attacking information systems
Here are some of those definitions
“…the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political and social objectives (Denning, 2000).”
“… the premeditated, politically motivated attack against information, computer systems, and data which result in violence against noncombatant targets by subnational groups and clandestine agents (Pollitt,2001).”
“ The extent to which cyber-techniques are used for espionage, sabotage, or terrorism (Bronskill, 2001)”
Key Point To Consider How to determine the difference between CyberTerrorism, hacking, and vandalism. One major, identifying factor is understand the motivation or intention of the person or group carrying out the attack.
Desmond’s Example Most people would not view a 14-year-old launching a virus as Cyber-Terrorism; However launching a virus attack could easily be viewed as Cyber-Terrorism. This is why it is important to consider the intentions and motivations of the person or group launching the attack.
Taking a look at the differences A 14-year-old could be motivated by the desire for attention, the desire to cause trouble, or the desire to prove themselves capable of launching a virus attack. The character Zero Coolmovie,  Hackers , is an example of this. Dade "Zero Cool" Murphy is arrested and charged, at the age of 11, with crashing 1,507 systems in one day and causing a single day 7 point drop in the New York Stock Exchange.
Taking a look at the differences cont. A CyberTerrorist group would most likely have more specific goals or objectives, usually political. The movie,  Live Free Or Die Hard , is an example of this. A terrorist group led by a vindictive, ex government employee, plotted to systematically shut down the United States infrastructure with a plan that consisted of three parts: 1) Disabling all traffic and transportation hubs/systems 2) Disrupt financial sectors and telecommunications 3) Disabling  water/electric/ oil utilities, nuclear systems, and anything else tied into computers, Notice the specific goals
Just how susceptible is the United States? http:// youtube.com/watch?v =RaQCURNL5rQ
THE END

More Related Content

PPTX
Cyber terrorism
PPTX
Cyber Terrorism
PPTX
Cyber crime and Security
PPTX
Cyber crime
PPTX
PPTX
Cyber Crime PPT
PPTX
Cyber crime
PPTX
CYBER CRIME
Cyber terrorism
Cyber Terrorism
Cyber crime and Security
Cyber crime
Cyber Crime PPT
Cyber crime
CYBER CRIME

What's hot (20)

PPTX
CyberCrimes
PPTX
Cyber Terrorism
PPTX
1358619756 cyber terrorism
PPT
Module 5 Sniffers
PPTX
Cyber terrorism
PPTX
Spamming as cyber crime
PPTX
Cyber Crime
PPTX
CYBER TERRORISM
PPTX
Cyber Crime & Security
PPTX
Cyber Crime
PPTX
Cyber Crime
PPT
cyber terrorism
PPT
Cyber crime
PPTX
Cyber crime ppt
PPTX
It act and cyber crime
PPT
Cyber ppt
PPTX
Cyber security
PPTX
Power point cybercrime
PPTX
Cyber Crime
PPTX
Cyber terrorism
CyberCrimes
Cyber Terrorism
1358619756 cyber terrorism
Module 5 Sniffers
Cyber terrorism
Spamming as cyber crime
Cyber Crime
CYBER TERRORISM
Cyber Crime & Security
Cyber Crime
Cyber Crime
cyber terrorism
Cyber crime
Cyber crime ppt
It act and cyber crime
Cyber ppt
Cyber security
Power point cybercrime
Cyber Crime
Cyber terrorism
Ad

Similar to Cyber Terrorism Presentation (20)

PDF
CyberTerrorismACaseOfAliceInWonderland
PPT
28658043 cyber-terrorism
PDF
The Patriot Act Title Vii Section 814 And 816
PDF
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
DOCX
ECON 202 Written AssignmentDue April 28th Submitted through Blac
PPTX
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
PDF
Terrorist Cyber Attacks
PDF
Intelligence Collection
PDF
A View Of Cyberterrorism Five Years Later
PDF
Securing Cyber Space- Eljay Robertson
PPSX
Cyber crime
PPTX
Cybercrime an international-crisis
PPTX
Cybercrime an international-crisis
DOCX
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
PDF
Cyber Terrorism Essay
PDF
Causes of the Growing Conflict Between Privacy and Security
PPTX
The securitization of online activism
PPTX
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
DOCX
Cyber Espionage The Silent Crime of Cyberspace Virginia G
PPTX
International-Dimensions-of-Cybercrime (1).pptx
CyberTerrorismACaseOfAliceInWonderland
28658043 cyber-terrorism
The Patriot Act Title Vii Section 814 And 816
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
ECON 202 Written AssignmentDue April 28th Submitted through Blac
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Terrorist Cyber Attacks
Intelligence Collection
A View Of Cyberterrorism Five Years Later
Securing Cyber Space- Eljay Robertson
Cyber crime
Cybercrime an international-crisis
Cybercrime an international-crisis
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDi
Cyber Terrorism Essay
Causes of the Growing Conflict Between Privacy and Security
The securitization of online activism
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Cyber Espionage The Silent Crime of Cyberspace Virginia G
International-Dimensions-of-Cybercrime (1).pptx
Ad

More from merlyna (20)

PPT
The truth of science for justice and peace(4)
PPTX
Asu Complaint Choir 2009
PDF
Lim Jus394 Internet Publicsphere
PDF
Lim Jus394 Utopian Dystopian
PDF
Jus394 Nethistory
PDF
Jus494 Politics Technology
PDF
Jus394 Spring09 Intro
PDF
Lim Kuala Lumpur 2008
PPT
Salvador Castro Globalization
PPT
Joseph Vogt: Farming
PPT
Karen Kasold: Media Globalization And Inequality
PPT
Crystina Riffel: Pharmaceutical Drug Policies
PPT
Douglass Swhwimer: Outsourcing
PPT
Kevin Overbeck: Race Science And Inequality
PPT
Erika Ricard: Reliance and Dependency -- Cell Phone
PPT
Paul Shenkyr Presentation
PPT
Tony Ngon: Corporate Use of Technology
PPT
Yvonne Plascencia: Malnutrition
PPT
Ryan Carpenter: The Role Technology Played In The Cold War
PPT
Quinn Heydt: Steroids And Issues Of Inequality And Morality
The truth of science for justice and peace(4)
Asu Complaint Choir 2009
Lim Jus394 Internet Publicsphere
Lim Jus394 Utopian Dystopian
Jus394 Nethistory
Jus494 Politics Technology
Jus394 Spring09 Intro
Lim Kuala Lumpur 2008
Salvador Castro Globalization
Joseph Vogt: Farming
Karen Kasold: Media Globalization And Inequality
Crystina Riffel: Pharmaceutical Drug Policies
Douglass Swhwimer: Outsourcing
Kevin Overbeck: Race Science And Inequality
Erika Ricard: Reliance and Dependency -- Cell Phone
Paul Shenkyr Presentation
Tony Ngon: Corporate Use of Technology
Yvonne Plascencia: Malnutrition
Ryan Carpenter: The Role Technology Played In The Cold War
Quinn Heydt: Steroids And Issues Of Inequality And Morality

Recently uploaded (20)

PDF
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Google’s NotebookLM Unveils Video Overviews
PDF
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
PPTX
CroxyProxy Instagram Access id login.pptx
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Dell Pro 14 Plus: Be better prepared for what’s coming
PDF
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
PDF
REPORT: Heating appliances market in Poland 2024
PDF
DevOps & Developer Experience Summer BBQ
PPTX
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Building High-Performance Oracle Teams: Strategic Staffing for Database Manag...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Google’s NotebookLM Unveils Video Overviews
CIFDAQ's Market Wrap: Ethereum Leads, Bitcoin Lags, Institutions Shift
Reimagining Insurance: Connected Data for Confident Decisions.pdf
How AI Agents Improve Data Accuracy and Consistency in Due Diligence.pdf
CroxyProxy Instagram Access id login.pptx
GamePlan Trading System Review: Professional Trader's Honest Take
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Dell Pro 14 Plus: Be better prepared for what’s coming
HCSP-Presales-Campus Network Planning and Design V1.0 Training Material-Witho...
REPORT: Heating appliances market in Poland 2024
DevOps & Developer Experience Summer BBQ
ABU RAUP TUGAS TIK kelas 8 hjhgjhgg.pptx
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
ai-archetype-understanding-the-personality-of-agentic-ai.pdf
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Chapter 3 Spatial Domain Image Processing.pdf

Cyber Terrorism Presentation

  • 1. CyberTerrorism JUS 394 Nick Messina
  • 2. Objective To be able to determine which unlawful acts are actually considered CyberTerrorism. The United States’ susceptibility to CyberTerrorism
  • 3. What is CyberTerrorism? Since the idea of CyberTerrorism is relatively new, its definitions continue to evolve, which is why there is no official definition of CyberTerrorism. It varies from… Stealing Data and hacking Planning terrorist attacks Causing violence Or attacking information systems
  • 4. Here are some of those definitions
  • 5. “…the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political and social objectives (Denning, 2000).”
  • 6. “… the premeditated, politically motivated attack against information, computer systems, and data which result in violence against noncombatant targets by subnational groups and clandestine agents (Pollitt,2001).”
  • 7. “ The extent to which cyber-techniques are used for espionage, sabotage, or terrorism (Bronskill, 2001)”
  • 8. Key Point To Consider How to determine the difference between CyberTerrorism, hacking, and vandalism. One major, identifying factor is understand the motivation or intention of the person or group carrying out the attack.
  • 9. Desmond’s Example Most people would not view a 14-year-old launching a virus as Cyber-Terrorism; However launching a virus attack could easily be viewed as Cyber-Terrorism. This is why it is important to consider the intentions and motivations of the person or group launching the attack.
  • 10. Taking a look at the differences A 14-year-old could be motivated by the desire for attention, the desire to cause trouble, or the desire to prove themselves capable of launching a virus attack. The character Zero Coolmovie, Hackers , is an example of this. Dade "Zero Cool" Murphy is arrested and charged, at the age of 11, with crashing 1,507 systems in one day and causing a single day 7 point drop in the New York Stock Exchange.
  • 11. Taking a look at the differences cont. A CyberTerrorist group would most likely have more specific goals or objectives, usually political. The movie, Live Free Or Die Hard , is an example of this. A terrorist group led by a vindictive, ex government employee, plotted to systematically shut down the United States infrastructure with a plan that consisted of three parts: 1) Disabling all traffic and transportation hubs/systems 2) Disrupt financial sectors and telecommunications 3) Disabling water/electric/ oil utilities, nuclear systems, and anything else tied into computers, Notice the specific goals
  • 12. Just how susceptible is the United States? http:// youtube.com/watch?v =RaQCURNL5rQ