Cyber-Terrorism Australia ARF Seminar on Cyber-terrorism Busan 16 - PowerPoint PPT Presentation

Loading...

PPT – Cyber-Terrorism Australia ARF Seminar on Cyber-terrorism Busan 16 PowerPoint presentation | free to download - id: 421e60-YTVjZ



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

Cyber-Terrorism Australia ARF Seminar on Cyber-terrorism Busan 16

Description:

Cyber-Terrorism Australia ARF Seminar on Cyber-terrorism Busan 16 19 October 2007 What is Cyber-Terrorism? An action or threat of action which seriously ... – PowerPoint PPT presentation

Number of Views:168
Avg rating:3.0/5.0
Slides: 20
Provided by: aseanregio
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Cyber-Terrorism Australia ARF Seminar on Cyber-terrorism Busan 16


1
Cyber-Terrorism AustraliaARF Seminar on
Cyber-terrorismBusan 16 19 October 2007
2
What is Cyber-Terrorism?
  • An action or threat of action which seriously
    interferes with, seriously disrupts, or destroys,
    an electronic system including, but not limited
    to information, telecommunications or financial
    systems.
  • Security Legislation Amendment (Terrorism) Act
    2002

3
What is Cyber-Terrorism?
  • The action is done or the threat is made with the
    intention of
  • advancing a political, religious or ideological
    cause and
  • coercing, or influencing by intimidation, the
    government of the Commonwealth or a State,
    Territory or foreign country (or part of) or
  • intimidating the public or a section of the
    public.
  • Security Legislation Amendment (Terrorism) Act
    2002

4
What is Cyber-Terrorism?
  • The action must cause
  • serious physical harm to a person or
  • serious damage to property or
  • a persons death or
  • endanger a persons life or
  • create serious risk to public health or safety.
  • Security Legislation Amendment (Terrorism) Act
    2002

5
Example Maroochy Water
  • Act of sabotage on Maroochydore sewerage
    treatment system in 2000
  • SCADA system manipulated
  • One of only a handful of confirmed incidents of
    critical infrastructure sabotage by cyber attack
  • Not of sufficient scale or motivation to
    constitute cyber-terrorism

6
Challenges of New Technology
  • Technological Convergence
  • Data, voice and video sharing over a single comms
    infrastructure
  • Reduces diversity increases dependence upon
    core networks
  • Increases opportunities for cyber-terrorism
  • Denial of service in addition to risk of data
    manipulation

7
Cyber-Terrorism Capabilities
  • Terrorist groups making increasing use of
    Internet and other technologies.
  • Increasing links between terrorists and cyber
    criminals
  • Recent terrorist events funded through online
    fraud?
  • May be increasing the computer skills of
    terrorist groups and access to skilled
    programmers
  • Terrorist groups expanding recruitment to people
    studying maths, computer science and engineering

8
What is Terrorist Use of the Internet?
  • Terrorist use of the internet is different from
    Cyber-terrorism
  • Concerns terrorist use of Information
    Communications Technology (ICT) to facilitate and
    maximise the impact of real world, traditional,
    terrorist actions as well as a means of
    influencing individuals and communities.

9
The Internet as a Source of Radicalisation
  • The internet is a powerful tool to influence
    people.
  • Terrorist groups are increasingly using the
    internet to spread propaganda, radicalising and
    recruiting individuals by indoctrinating them
    with extremist ideologies.

10
The Internet as an Operational Tool for Terrorists
  • Computer Mediated Communications (CMC)
    facilitates real world terrorist operations by
    making them cheaper, faster and more secure.

11
The Internet as a Force Multiplier for
Terrorist Actions
  • By showing graphic images, such as beheadings and
    IED attacks terrorist groups are engaging in a
    form of psychological warfare against their
    target audience.
  • The internet and other global media serves as
    force multiplier for terrorist actions.

12
Protection of Australias NII
  • Australian Government is committed to protecting
    Australias critical information and physical
    infrastructure

13
(No Transcript)
14
Critical Infrastructure ProtectionModelling and
Analysis (CIPMA)
  • Goals
  • Business-Government partnership

15
Protection of Australias NII
  • Australian Governments objective to create a
    trusted and secure electronic operating
    environment
  • The E-Security National Agenda
  • Joint Operating Arrangement

16
Protection from Cyber Attack
  • Encryption
  • Firewalls intrusion detection products
  • Virus protection software
  • Password control protection
  • Internal security policies
  • Patching security vulnerabilities quickly
  • Information sharing on good practice
  • Isolation of critical systems

17
Conclusion
  • No instance of cyber-terrorism to date, however
  • The threat of cyber-terrorism is increasing
  • Remotely controlled systems are increasing the
    attraction
  • Vulnerabilities are increasing while costs of
    attack are decreasing
  • Interdependencies are not well understood
  • Threat must be acknowledged and addressed

18
  • cip_at_ag.gov.au (General CIP
    matters)
  • www.tisn.gov.au (Trusted
    Information Sharing Network website)
  • www.nationalsecurity.gov.au (A-Gs website on
    national security)

19
  • THANK YOU
About PowerShow.com