Cyber Terrorism Flashcards
What is Cyber Terrorism?
Cyber terrorism is the use of computers and the Internet connectivity between them to launch a terrorist attack.
Espionage
espionage is simply any attempt to acquire information to which you do not have legitimate access.
steps to take
- Always use all reasonable network security: ids, firewall
There are several ways that a computer- or Internet-based terrorist attack could cause significant harm to a nation.
: Direct economic damage
Economic disruption
Compromising sensitive/military data
Disrupting mass communications
Against Information Warfare
In essence, information warfare is any attempt to manipulate information in pursuit of a military or political goal. When you attempt to use any process to gather information on an opponent or when you use propaganda to influence opinions in a conflict, these are both examples of information warfare.
Propaganda
Another example of information warfare.It’s a bias, misleading
Packet sniffers
A packet sniffer is an application that intercepts packets traveling on a network or the Internet and copies their contents.
Why would a Security IP professional use packet sniffer :
To look at packet travelling through traffics to set the baseline. Check to see if packets are encrypted monitor traffics Montior for malformed packets Monitor supsted Dos in pogress
CommView
Packet sniffing that gives statistics regarding packets it captures.
Wireshark
Packet sniffing - easy to use GUI- User can filter packet
What hacker look for with sniferr packer
to get data from the packets
to find out information about your network such as the IP address of servers, routers, or workstations. T
Info that packet sniffer display
1- Source IP address of the Packet
2-Destination IP address of the packet
3-Protocol if the packet
4-Contents of the packet, usually in hex form