jeudi 22 août 2013

Special Webcast: Cyber Terrorism: Fact or Fiction

The topic of Cyber Terrorism has been a subject of many debates as to the reality of a significant event-taking place at the click of the button. In recent media coverage we've seen the London & Spain train bombings being triggered remotely using one of the most world's most adopted technologies, a cell phone. Who would ever think that someone would use a cell phone as a trigger point for detonating a bomb? Additionally, who would ever think that a terrorist organization would realize that all cell phones on the same cellular network receives their time/date from the same network timeserver so everyone has the correct time. This has allowed them to conduct simultaneous attacks via sms or speed dial on their phone. In the traditional form of terrorism, these attack where easily characterized as terrorism. We had a significant event take place and a terrorist organization claiming responsibility. Another example of a terrorist organization exploiting technology were the events that took place in India. This time the terrorist organization was using smart phones as a means to communicate when they were conducting their operation.
These are few examples that have been covered widely by the media and fit the definition of terrorism causing fear, disruption, and destruction and in some cases total chaos. According to Stratfor, terrorist organizations typically follow a six stage process before they conduct an operation; target selection, planning, deployment, attack, escape and exploitation. Today, all of these steps can be carried out on the Internet. Globalization and the borderless Internet has brought commerce to every corner of the planet and with that has brought a very dark side of the Internet. In today's webcast we will be covering the threat landscape, the proliferation of cyber weapons, Hacking as a Service (HaaS), critical infrastructure targeting, use cases and mitigation techniques.

Aucun commentaire:

Enregistrer un commentaire