Your browser does not support JavaScript. Please to enable it.

Terms & Conditions

The idea you wish to view belongs to a community that requires acceptance of terms and conditions.

RejectAccept

    Help to Improve This Idea.

    Search

     
    Prev | Next

    Countering Terrorism and Cyber-Terrorism attacks

    by Sai Sireesha Tirumala Pudi 11/10/2019 04:47 PM GMT

    • {{:upVoteCount}}
    Username * ()

        Move idea from "Submission and Collaboration" stage to:

          Collapse
          I accept the terms and conditions (see side bar). I understand all content I am submitting must be licensed under an open-source software or Creative Commons license as described in the Terms and Conditions:

          on

          Description

          The fast development of information and communication technologies, and widespread services provided by the cyberspace raise the inquiry, "In what capacity can security of the internet be guaranteed?".

          In the technologically advanced world, finding the malicious and illegal data transfer and communication is creating a major issue. To prevent  the risk of potentially disastrous cyber terrorist and cyber terrorist communication, nations’ policy makers are progressively considering on the utilization of discouragement procedures to enhance digital barrier.

          Nations make their own national arrangements and methodologies which spread digital security countermeasures including digital barrier and discouragement against cyber attacks.

          Terrorism and the Internet: Utilization of the Internet and the computer systems will correspond to a major challenge in the future. Such use could incorporate utilization of the nets as a purposeful publicity device, yet in addition as a methods for correspondence between terrorist organization and different associations.

          Common types of cyber crimes:

          • Unapproved access to computer frameworks and administration
          • Harm to or modifications of computer information or programs
          • Computer forgery
          • Unofficial model of legally protected computer program

          Five common attack methods:

          • Application layer attacks
          • IP spoofing
          • Password attacks
          • Network packet sniffers
          • Denial-of-service attacks

          Best Practices: Develop, deploy, review, and impose security policies that satisfy business objectives.

          • Risk Management: Intermittently conduct an information security risk evaluation that identifies critical information resources.
          • Access Control: Create a range of security controls to protect resources residing on systems and networks.
          • Software Integrity: Regularly verify the reliability of installed software.
          • Backups: Require a regular schedule of backups for both software and data.
          • Monitor and Audit: Use appropriate monitoring, reviewing, and inspection facilities and assign responsibility for reporting, evaluating, and responding to system and network events and conditions.
          • Physical Security: Control physical access to information resources and IT services and resources.

          Co-authors to your solution

          Uday Karthik, Sreeja Rajput

          Link to your documentation or presentation.

          Link to an online working solution or prototype

          Link to a video or screencast of your proposal or prototype.

          Link to your source code, data, images, or other assets.

          digital-terrorism,internet,cybersecurity,artificialintelligence,counterterrorism,empoweringyouth

          Move this Idea

          Select a Category

          Close this idea

          When closing an idea, you must determine whether the idea has exited successfully or unsuccessfully.

          Copy idea to another community

          Add Team Members

            Maximum number of team members allowed: 15
            *Required

            Help to Improve This Idea.

            0%
            0%
            0%
            User Tasks ?
            Required for graduation.
            Task Assigned to Due Date Status
            Review Panel 12/25/2019 Incomplete
            No ideas found!
            No activities yet.