(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

OnSite I.T. has been serving the Alberta area since , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call OnSite I.T. at (403) 210-2927 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Privacy Network Security Hardware Business Computing Cybersecurity Internet Wi-Fi Malware Android Smartphones Technology Ransomware Microsoft Cloud Passwords Mobile Devices Email Applications Data Management Wireless Tech Terms Router Remote Computing Cortana Software Communications IT Services Phishing Backup Excel Smartphone Saving Money Blockchain Windows 10 Data Breach Computers Wireless Charging IT Support Data Small Business Outsourced IT Government Business Management Managed IT services VPN Employer-Employee Relationship Data Protection Business Save Money Cost Management Internet Explorer Holiday File Sharing Data loss HIPAA Patch Management VoIP Analytics Environment Server Threat eCommerce Hard Drive Technology Tips Comparison Computer Communication Business Intelligence e-waste Network Attached Storage Printing Online Shopping Virus User Security Processors Data Backup Specifications Telecommuting Marketing Physical Security disposal Password Paper Antivirus Hackers Vulnerability Backup and Disaster Recovery Conferencing Workers Laptop Value Efficiency Ink Settings Staff Office 365 Business Technology Spyware SSD Office Millennials Tech Term Server Management PowerPoint Battery Cloud Computing Spam HP Facebook Hard Drives Content Filtering How To Productivity Database Automation Sports Websites Sales Document Management Twitter Hosted Solutions Gmail Apple Chrome IT budget Cybercrime Artificial Intelligence Internet of Things Lead Generation Networking Tablet Paperless Office Inventory iPhone Managed IT Service Safety Tactics Machine Learning Connectivity Virtual Assistant Dongle Knowledge Digital Mobile Security Managed IT Services Telephony Browser Law Enforcement Bandwidth Big Data Innovation Edge Operating System Tip of the week IT Management Maintenance Voice over IP Miscellaneous User Tips Telecommute WannaCry BDR Google User Tip Social Media Virtualization Trends Data recovery Search Windows 10 Presentation 5G Wireless Technology Managed Service Provider IBM Hacker Microsoft Office Customer Relationship Management IP Address Website Remote Monitoring Customer Service Mobile Office Domains Mobile Device Management Public Speaking Two-factor Authentication Lithium-ion battery Augmented Reality Tech Support Apps Productivity The Internet of Things Budget Gadgets Hiring/Firing Competition Alert Streaming Media Fun Users Downloads Upgrade