(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call OnSite I.T. at (403) 210-2927 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Malware Cloud Internet Passwords Communication Android Browser Efficiency Productivity User Tips Hardware Data Small Business Managed IT services Ransomware Google Saving Money Hosted Solutions Communications Wi-Fi Microsoft Business Management Mobile Device Software Applications Windows 10 Employer-Employee Relationship Workplace Tips Users Innovation Backup Blockchain IT Support Social Media Collaboration Network Mobile Devices VoIP Email Business Intelligence Cost Management Virtual Assistant Data Protection IT Services Bandwidth Smartphone Marketing Hackers Phishing VPN Internet of Things Patch Management BDR Data Breach Compliance Cloud Computing Excel Miscellaneous Virtualization Gmail Router Save Money Data recovery Data Management Remote Computing Business Wireless Outsourced IT Computers Wireless Charging Automation Analytics Government Managed IT Service Tech Terms Networking Cortana Managed IT Services Artificial Intelligence Computer Information Data Backup PowerPoint Medical IT Online Shopping Network Attached Storage Bring Your Own Device Paperless Office Dongle iPhone Workers Mobile Security Business Technology RAM Authorization Processors Antivirus Tip of the week Internet Explorer Analysis Apps Safety Trends Machine Learning Office Database Amazon Physical Security Backup and Disaster Recovery Voice over IP Sports SaaS Password Environment Hybrid Cloud Digital Millennials Operating System Microsoft Office Microsoft Teams Vulnerability Staff User Tip Gadgets Threat Managed Service A.I. Touchscreen Content Filtering Cybercrime Laptop SSD File Sharing Holiday GDPR Settings Big Data e-waste Cables Edge IT Management Sales Office 365 Company Culture Spyware Printing eCommerce Movies Microsoft Office 365 WannaCry Telecommute Tactics Plug-In Facebook Connectivity Storage Battery Server Management Hard Drives Comparison disposal Voice over Internet Protocol Chrome Paper Tablet Managing Stress HP Websites How To User Security Access Control HIPAA Data loss Server Troubleshooting Spam Proactive IT Twitter Streaming Media Dark Web Specifications Value Technology Tips Ink Reporting Knowledge G Suite Document Management Apple Telecommuting Unified Communications Authentication Hard Drive Virus Update Maintenance Remote Monitoring and Management IT budget Inventory Downloads Error Lead Generation Conferencing Law Enforcement Telephony Managed Service Provider Augmented Reality Wireless Technology 5G Outlook Tech Support Hiring/Firing IBM The Internet of Things Productivity Hacker Fun Quick Tips Budget Competition Disaster Recovery Customer Relationship Management Remote Monitoring IP Address Website Printers Customer Service Upgrade Mobile Office Regulation Search Domains Alert Mobile Device Management Windows 10 Public Speaking Presentation Two-factor Authentication Lithium-ion battery