888.678.7282    Get SUPPORT

Strata Information Technology Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Strata Information Technology at 888.678.7282 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Malware Cybersecurity Hackers Communications Tech Term Ransomware Backup Internet Software Alert Smartphones Outsourced IT VoIP Network Security Passwords Productivity Business Management Social Media IT Support Phishing Business Google Hardware Save Money Hosted Solutions Microsoft Data Small Business Data Recovery Cloud Computing Smartphone Microsoft Office Browser Vulnerability IT Services Data Breach User Tips Android Network App Data Backup Bandwidth Twitter Windows 10 Email Communication BDR Apps Law Enforcement Productivity Blockchain Mobile Device Patch Management Workers Innovation Collaboration Office 365 Settings Employer-Employee Relationship Miscellaneous Remote Monitoring Scam Excel Saving Money Company Culture Cybercrime Politics Access Control Government Mobile Device Management Efficiency Internet of Things Computer Business Continuity Compliance How To Applications Facebook Entertainment Recovery Antivirus Maintenance Password Retail Holiday Computers Users Office Website Education Personal Information Vendor Management Automation Managed IT Service SaaS Spam Dark Web Networking Managing Stress Chrome Virus Windows Word Wi-Fi Virtual Assistant HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer iPhone Error Data loss Gadget Safety Telephone System WannaCry Unified Threat Management HP Biometrics Sales Managed Service Provider Cost Management Streaming Media Marketing Travel Workplace Tips Business Intelligence The Internet of Things Regulation Cleaning Printers Gadgets Budget Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Tablet Downloads Live Streaming Reporting Computer Care Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption BYOD Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics Knowledge Artificial Intelligence Trends WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT IT budget PowerPoint Gaming Console Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Analytics Authentication Wireless Processors Digital Internet Explorer GDPR Comparison Hard Drives A.I. Scalability Phone System Lead Generation disposal IT Management Sports Video Games Google Maps Emergency Telephony DDoS Inventory Information Mobile Devices Remote Monitoring and Management Threat IaaS Two-factor Authentication Authorization Dongle Worker Apple Edge Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards News Dark Data Spyware Value Television Information Technology Tech Terms Connectivity Staffing Licensing Voice over IP Amazon Smart Technology Email Management Laptop Printing Quick Tips Remote Computing Samsung Wireless Technology 5G Money IBM Conferencing Unified Communications Network Attached Storage Managed IT Services Hacker eCommerce Operating System Paper Telecommuting Customer Relationship Management Competition Server Management IP Address Online Shopping Environment Big Data Ink Millennials Fun Customer Service Google Drive Mobile Office Upgrade IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Search Scheduling Copy Public Speaking Spam Blocking User Security Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Instagram Mobile Security Paste Augmented Reality Business Technology

Newsletter Sign Up