07-10-2014, 02:11 PM
CYBERTERRORISM
CYBERTERRORISM.pptx (Size: 791.64 KB / Downloads: 77)
INTRODUCTION
As the use of Internet is increasing day by day, traditional concepts and methods of terrorism have taken new dimensions.
Individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and even the countries.
Password Cracking
Password cracking can be implemented using brute-force attacks, Trojan horse programs and IP spoofing.
Password attacks usually refer to repeated attempts to identify a user account and/or password; these repeated attempts are called brute-force attacks.
One example is weak encryption(LM hash) used by Microsoft windows XP, can easily be attacked.
CONCLUSION
Cyber terrorism is a scary concept for many reasons. It can do possible serious damages to various aspects of our lives. It is even scarier that cyber terrorism is so difficult to catch and track and prosecute.
The information age has brought us many good things, but along with those good things came some bad things too.
All we can do as citizens is to protect ourselves by protecting our information, who we give it to and how much we give it out. Our government is trying to do its part, so let’s support them and their efforts and stop this cyber battle.