cyber terroristism
TRANSCRIPT
![Page 1: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/1.jpg)
NUR ATHIRAH BINTI AHMAD ZAINEEBM 111 5F
2010288848
CYBER TERRORISTISM
![Page 2: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/2.jpg)
Cyber terroristism ?Action that varied as
data and hacking , planning
an cyber attacks , causing
violence or attacking
information systems by
cyber terrorists
![Page 3: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/3.jpg)
cyber terrorist ?
attackers towards
unlawful attacks
against computer ,
network and
information system
![Page 4: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/4.jpg)
WHY CYBER TERRORISTISM
CAN BE THREAT ???
![Page 5: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/5.jpg)
according to the Institute for Security
Technology studies at Darmouth College,
cyber terroristism now pose a significant
threat and cyber attacks are increasing
in frequency, scope and sophistication.
![Page 6: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/6.jpg)
US Commission on Critical
Infrastructure Protection
Notes noted that neighbouring
countries offer o protection
against cyber terroristism
![Page 7: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/7.jpg)
ON YOUR COMPUTER SCRENE !Without notice it , you had been a victims
of cyber terroristism
![Page 8: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/8.jpg)
Most activist hackers!
Anonymous
![Page 9: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/9.jpg)
Cyber terroristism INCREASE cyber crime !
![Page 10: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/10.jpg)
![Page 11: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/11.jpg)
Why cyber terroristism
occur ?Has cyber terroristism actually occur ?
![Page 12: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/12.jpg)
Cyber Terrorism Cannot DAMAGE Anybody And Can Not Made
Anyone DIED !
According To Desauza And Hesgen (2003), Cyber Terrorism is
REAL AND HARMFUL
![Page 13: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/13.jpg)
Preventing Cyber Terrorism
![Page 14: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/14.jpg)
Form of computer crime or misuse
Unauthorized, delibrate and
internally recognizable misuse
of assests of local information system
by individual (Straub , 1986, p.27)
Computer Crime / Misuse
![Page 15: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/15.jpg)
Koung(1992), establish a taxonomy distinguish between the various sources of misuse
Legitimate access to the information system
Without refers to individuals not employed by organization
Having privileged access to the
information system
Without refers to collision between
external and internal personnel of either a non technical nature
or not
![Page 16: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/16.jpg)
Model of computer security
Quantity of the different of computer security have been planned within the literature .
Bell-lapadula ModelBiba ModelClark Wilson Model
all these model work with CIA framework to stop misuse by examining individual behavior
Work out with CIA framework
![Page 17: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/17.jpg)
CIA MODEL(Confidentialit
y, Integrity, Availability)
defending data confidentiality and reliability
based on references disciplines of psychological & criminology
recommend some protection against cyber terrorism
goal oriented of this model are limited for defending organizations against computer misuse.
![Page 18: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/18.jpg)
Behavioral model Attitude toward the
behaviour
Perceived behavioral control
Intentions Subjective norms Behavior
![Page 19: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/19.jpg)
Straub’s computer security model(Straub,1986)
First layer : deterrents which policies of acceptable or unacceptable uses of IS
second layer : active measure (preventives) such as password and
encryption designed to block intrusions
Third layer : detectives designed to detect misuses after
that occur so recovery process can take place
![Page 20: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/20.jpg)
Cyber terrorism also give huge impact on consumer buying pattern
Negative impacts on internet security and
consumer buying purchase pattern
Impacts on trust between buyer and seller transactions
![Page 21: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/21.jpg)
negative impacts on internet security and
consumer buying purchase pattern
![Page 22: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/22.jpg)
Analyses of recent customer surveys have suggested that while many view the internet as a marketing channel valued for its convenience and ease of use for shopping, security and privacy issues are very influential on decisions to buy online
(smith and rupp, 2002a,b)
![Page 23: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/23.jpg)
95 % of US consumers polled in a Gartner Group Survey
indicated concerns about privacy and security when making online purchases
(saban et al , 2002)
![Page 24: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/24.jpg)
![Page 25: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/25.jpg)
Impacts on trust between buyer and
seller transactions
![Page 26: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/26.jpg)
Social psychologist define trust as an expectation about the behavior of others in transactions, focusing on the contextual factors that enhance or inhibit the development and maintenance of trust.
(grabner-kracturer,2002,p.44)
![Page 27: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/27.jpg)
..REFERENCES..
![Page 28: Cyber terroristism](https://reader035.vdocuments.us/reader035/viewer/2022070316/55599489d8b42a14638b5260/html5/thumbnails/28.jpg)
Foltz, C. B. (2004). Information Management & Computer Security. cyberterrorism,computer crime and reality , 154-165.
Smith, A. D. (2004). Online Information Review. cybercriminal impacts on online business and consumer , 224-234.