(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call OnSite I.T. at (403) 210-2927 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Tech Term Privacy Business Computing Network Security Cybersecurity Smartphones Malware Hardware Managed IT services Wi-Fi Microsoft Ransomware Passwords Communication Cloud Communications Android Internet Network Email Data Small Business Applications Software Blockchain Employer-Employee Relationship Google IT Support Backup Saving Money Business Intelligence Social Media Hosted Solutions Business Management Mobile Devices Computer VPN Data Protection Efficiency BDR Information IT Services Smartphone Cost Management Windows 10 Phishing Save Money Data recovery Data Management Patch Management Data Breach Productivity Browser Excel Computers Router Wireless Charging Automation Virtualization Gmail Analytics Tech Terms Innovation Networking User Tips Internet of Things Remote Computing Artificial Intelligence Compliance Outsourced IT Data Backup Government Managed IT Service Business Wireless Virtual Assistant Cortana VoIP Collaboration Operating System Value Vulnerability Staff Streaming Media iPhone Workers G Suite Business Technology Ink Reporting Tip of the week Laptop SSD Voice over IP Settings Maintenance Remote Monitoring and Management Office Edge Unified Communications IT Management Spyware Cloud Computing Downloads Millennials Bring Your Own Device WannaCry Telecommute Apps Safety PowerPoint Medical IT User Tip Facebook RAM File Sharing Holiday Battery Server Management Marketing Internet Explorer Analysis Content Filtering Database Amazon HP Websites Hackers Microsoft Office Trends Twitter Environment Hybrid Cloud Sales HIPAA Data loss Sports SaaS Big Data Microsoft Teams eCommerce Threat Managed Service Technology Tips Users Cybercrime Workplace Tips Hard Drives Comparison Document Management Office 365 A.I. Chrome IT budget Inventory e-waste Cables Tablet Hard Drive Virus Miscellaneous GDPR How To Company Culture User Security Lead Generation Printing Server Online Shopping Network Attached Storage Tactics Plug-In Specifications Paperless Office Dongle Movies Mobile Security Spam disposal Voice over Internet Protocol Knowledge Processors Antivirus Connectivity Apple Telecommuting Managing Stress Machine Learning Paper Managed IT Services Physical Security Backup and Disaster Recovery Law Enforcement Telephony Password Proactive IT Conferencing Digital Bandwidth Two-factor Authentication Managed Service Provider Presentation Dark Web Lithium-ion battery Hiring/Firing Augmented Reality Tech Support Wireless Technology 5G Error IBM Fun Productivity Hacker The Internet of Things Gadgets Budget Remote Monitoring Customer Relationship Management Competition IP Address Website Customer Service Search Upgrade Mobile Office Domains Storage Windows 10 Mobile Device Management Regulation Alert Public Speaking