(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call OnSite I.T. at (403) 210-2927 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Productivity Privacy Smartphones Internet Cybersecurity Malware Efficiency Mobile Device Hardware Microsoft Cloud Communication Android Browser Google IT Support Wi-Fi Email Data Passwords Small Business Network Ransomware Windows 10 Users Innovation Data recovery Holiday Backup Saving Money Wireless Internet of Things Mobile Devices Data Backup Hosted Solutions Business Management Communications Collaboration Software Managed IT services IT Services Applications Blockchain Employer-Employee Relationship Social Media Business Networking Workplace Tips VoIP Business Intelligence Outsourced IT Managed IT Services Marketing Hackers Smartphone Information Cloud Computing Medical IT Phishing Cost Management Save Money Miscellaneous Data Breach Data Management Patch Management Excel Computers Analytics Router Wireless Charging Automation Managed Service Virtualization Gmail Tech Terms Remote Computing Artificial Intelligence Compliance Government Managed IT Service Computer Connectivity Cortana Virtual Assistant Bandwidth Apps Access Control Password Mobility Microsoft Office VPN BDR Data Protection Remote Monitoring and Management User Tip Facebook Office 365 Bring Your Own Device Wireless Internet WannaCry Telecommute PowerPoint RAM Authorization File Sharing Update Battery Server Management Internet Explorer Analysis Content Filtering Trends Upgrade Database Amazon Security Cameras HP Websites Sports SaaS Twitter Environment Hybrid Cloud Sales Help Desk HIPAA Data loss Technology Tips Microsoft Teams eCommerce Outlook Spam Threat A.I. Touchscreen Chrome Cybercrime Hard Drives Comparison Word Document Management GDPR How To IT budget Inventory e-waste Cables Tablet Business Continuity Hard Drive Virus Company Culture User Security Profitability Lead Generation Printing Server Paperless Office Dongle Movies Microsoft Office 365 Online Shopping Network Attached Storage Tactics Plug-In Specifications Wearables Storage Apple Telecommuting Mobile Security disposal Voice over Internet Protocol Knowledge Certification Processors Antivirus Physical Security Backup and Disaster Recovery Managing Stress Eliminating Downtime Machine Learning Paper Digital Safety Law Enforcement Telephony Proactive IT Conferencing Healthcare Streaming Media Dark Web iPhone Workers Operating System Value Vulnerability Staff Tip of the week Laptop SSD G Suite Business Technology BYOD Gadgets Ink Reporting Edge Unified Communications Authentication Voice over IP Troubleshooting Settings Maintenance Office Downloads Error Millennials IT Management Big Data Training Spyware Website Fun Personal Information Customer Service Mobile Office Remote Monitoring Domains Quick Tips Mobile Device Management Windows 10 Public Speaking Search Presentation Two-factor Authentication Lithium-ion battery Disaster Recovery Augmented Reality Wireless Technology 5G Tech Support Regulation Printers IBM Alert The Internet of Things Productivity Managed Service Provider Hacker Budget Data Security Competition Customer Relationship Management Hiring/Firing IP Address