ATTENTION!!!!

ATTENTION!!!!

Friday 6 December 2013

Contents

             


            CONTENTS







      1.    Introduction
    

     
      2.    Cyberterrorism

  •  Factors
  •  Causes/Effects
  •  Examples    




        3.   Cyberbullies

  • Factors
  • Causes/Effects
  • Examples



      4.   Pornography

  •   Factors
  •   Causes/Effects
  •   Examples




     5.   Manipulating the truth
  •     Factors
  •     Causes/effects
  •     Examples    
    




      6.   Prevention


     
     








Cyberterrorism





               Cyberterrorism

   Meaning    
              Cyberterrorism is the use of Internet based attacks 

in terrorist activities, including acts of deliberate, large-scale 

disruption of computer networks, especially of personal computers 

attached to the Internet, by the means of tools such as computer 

viruses.





            
                



cases
              
                There are a lot of cases we can summarize according to the terrorism attack by using social networking, but one of the idea which can be seen via the terrorist attacks by misleading the social devices is in Mumbai city. Terrorists carried out multiple attacks on Mumbai in what many refer to as the worst terrorist incident in Indian history. This study, summarized below, explains how the terrorists in question could have used social media for coor-dination and decision-making purposes. The study argues that “the situational information which was broadcast through live media and Twitter contributed to the terrorists’ decision making process and, as a result, it enhanced the effectiveness of hand-held weapons to accomplish their terrorist goal.” To be sure, the “sharing of real time situational information on the move can enable the ‘sophisticated usage of the most primitive weapons.’” In sum, ”unregulated real time Twitter postings can contribute to increase the level of situation awareness for terrorist groups to make their attack decision.”
             


 

   




 Factors

This is happened around the world for some reasons, and the main reasons are:

  •  Every documents from the government and important files or softwares are secured using the information technology, so the hackers involve in hacking the profile try to steal the information or manipulate the information for their personal use or organisation.
  • There are many advantages over the traditional physical methods of terrorist attacks.
  • Society depends heavily on information technology.
  • Public works systems such as electrical, water, and traffic control are controlled by computers.
  • Communication is used for stock exchanges and banking










Causes &effects of Cyber Terrorism


  • Weaken a country’s economy.
  • Cause Environmental contamination.
  • Endanger public health / safety.
  • Alter or erase computerized medical, pharmacy or health insurance record among other things.
  • Hinder telecommunication system.
  • Shut down electrical power supply.





      


    Examples of cyber terrorism
  • In March 1997, a teenage hacker penetrated and disabled a telephone company computer that provided service to the Worcester Airport in Massachusetts, cutting off service to the airport control tower, fire department, security, and weather service for six hours.
  • In 1992, a disgruntled former employee of Chevron Corporation’s emergency alert network, hacked into computers in New York and San Jose, California and reconfigured the firm’s emergency alert system so that it would fail during an event. The disabled system was not discovered until an emergency arose at the Chevron refinery in Richmond, California and the adjacent community could not be notified during an accidental chemical release. During the ten-hour period in which the system was down, thousands of people in 22 states and six areas in Canada with Chevron facilities went without the Chevron emergency alert system. As suggested above, hackers also have attacked traffic regulation systems, disrupting traffic lights, with the potential for an increase in motor vehicle collisions.

       Y2K

  • Y2K is not a cyber terrorist attack. Instead it demonstrates the possible effects of what kind of effect cyber terrorism will have on the public.
  • A sense of fear and despair.





                                   Video in you tube on cyberterrorism


              

Cyberbullying

             


                 Cyberbullying





Cyberbullying
- is the use of Information Technology to harm or harass other people in a deliberate, repeated, and hostile manner.  According to U.S. Legal Definitions, Cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them.
With the increase in use of these technologies Cyberbullying has become increasingly common, especially among teenagers. Awareness has also risen, due in part to high profile cases like the Suicide of Tyler Clementi.

Legal definition
Cyberbullying is defined in legal glossaries as:
·         actions that use information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm another or others.
·         use of communication technologies for the intention of harming another person


·         use of internet service and mobile technologies such as web pages and discussion groups as well as instant messaging or SMS text messaging with the intention of harming another person.



                                  Factors that lead to Cyberbullies



         
       There is no one specific reason for the cyberbullies to occur. But the common reasons suited with Cyberbullies are by races difference, income/status differ, popularity and so on. Above are the graphs shows the factors of cyberbullies occurs.




    Causes/Effects




  





    Cyberbullying versus Bullying


   
   


  Examples

 
 


























Video of you tube based on Cyberbullies


Pornography

 




 There are many effects of the 

pornography on the internet.








Definition


Internet porn is sexually explicit content made available online in various formats including images, video files, video games

Effects 

1- The pornography addiction





Internet pornography is more addictive than that stash of Playboys. 







It feeds the separation between the addict and real self-love and healing.












2- Pornography leads to sexual crimes.

Edward Donnerstein (University of Wisconsin) found that brief exposure to violent forms of pornography can lead to anti-social attitudes and behavior such as rape.

- Dr. Dolf Zimmerman and Dr Jennings Bryant showed that continued exposure to pornography had serious adverse effects on beliefs about sexuality in general and on attitudes toward women in particular. 

- Sociologists Murray Straus and Larry Baron (University of New Hampshire) found that rape rates are highest in states which have high sales of sex magazines and lax enforcement of pornography laws. 





3- It is one of the causes of divorce

- A spouse's porn obsession was a factor in 56 percent of divorces.

- At a 2003 meeting of the American Academy of Matrimonial Lawyers, two-thirds of the 350 divorce lawyers noted that the Internet was playing an increasing role in marital splits, with excessive online porn watching contributing to more than half of the divorces.








Women protesting for their rights and asking for ban of pornography in New Delhi, India January 2, 2013












One of the associations in United States that helps families damaged by porn addiction.












4- Exposure to internet pornography among children can lead to depression and many other psychological problems.













Manipulating the truth





Manipulating the truth

Issue :
  • Distributing/reporting false info. Normally involve mass media, social network.


Example/Cases :
1. Death of national police chief – Tan Sri Ismail




2. Flood – releasing of dam water




3. Mystery of Villa Nabila


   


    


     Effects
  •  False info will be spreading
  • Conflict of information occur







prevention




prevention



1)Cyberterrorism




1)secure systems with hardware and software protection, install intrusion detection systems and respond immediately to any intrusions.

2) Affiliate with defensive organizations such as InfraGard, a public-private partnership to track threats. Use the FBI as a resource to keep up with threats and defense mechanisms.

3)Create a firm security policy. Train employees to guard 
against such things as opening email attachments or 
responding to messages from unknown sources

4)Test your defenses regularly. Employ a testing or security service to routinely try to invade your system or network -- and have it report any deficiencies. 


2)Cyberbullies


  • Establish rules regarding your child’s Internet, social media and cellular phone activity, and then thoroughly explain these rules to your child.
  • Explain that online behavior should mirror traditional social behavior.
  • Once you explain appropriate online behavior to your child, you should follow those rules yourself
  • The best way to know what your child sees and does online is to monitor his activity. This includes general supervision of, and participation in, his time spent online.

3)Pornography


Pornography and other addictive behaviors thrive in secrecy. That's why it is so important to cultivate relationships of trust and honesty in the home. When children are exposed to pornography, you don't want them to keep it a secret. You want them to talk about it — not so you can lecture, but so you can just talk.”
Benjamin Erwin

4)Manipulating the truth

  • Knows how to differ the right and wrong messages.
  • Dont bother everything, must be a rational thinker to decide before act.