888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Strata Information Technology at 888.678.7282 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Privacy Managed IT Services Technology Best Practices Cloud Cybersecurity Malware Hackers Ransomware Alert Backup Productivity Communications Outsourced IT Internet Network Security Software Business Management VoIP Microsoft Passwords Phishing Smartphones Hardware IT Support Save Money Business Social Media Tech Term IT Services Smartphone Data Breach App Android Email Data Vulnerability Windows 10 Twitter Computer Microsoft Office Office 365 Remote Monitoring Saving Money Settings Scam Politics Bandwidth Mobile Device Management Data Backup Government Business Continuity Small Business Law Enforcement Apps Productivity Cloud Computing Patch Management Workers Miscellaneous User Tips Google Excel Cybercrime Communication Facebook Mobile Device BDR Data Recovery Website Education Spam Virus Hosted Solutions Efficiency Word How To Entertainment Recovery Applications Antivirus Maintenance Browser Blockchain Password Employer-Employee Relationship Innovation Holiday Office Personal Information Retail Computers Collaboration Company Culture Vendor Management Chrome Internet of Things Access Control Windows Wi-Fi Spyware Sports Apple IT Management Credit Cards Cortana Dark Data Specifications Dongle Smart Technology Multi-Factor Security Printer Server Licensing HaaS Voice over IP Value HP Connectivity iPhone Tech Terms Managed Service Provider Unified Threat Management Bring Your Own Device Marketing Printers Travel Cleaning Gadget Cost Management Streaming Media WiFi Current Events Business Intelligence Battery VPN Botnet Hybrid Cloud Content Filtering Technology Tips Router Live Streaming Document Management Computer Care Shortcut Database Downloads Data Protection Net Neutrality Telephone Systems Data Management Gmail Backup and Disaster Recovery Disaster Recovery Tactics Automation WhatsApp Paperless Office Gaming Console CrashOverride Wireless Charging Trends Artificial Intelligence Remote Control Hard Drives Yahoo DDoS SSD Dark Web Lead Generation Internet Explorer Digital Video Games Mobile Devices Two-factor Authentication A.I. Worker Information Technology Television Google Maps Inventory Virtual Assistant Threat News Edge Avoiding Downtime Tech Support Movies Printer Email Management Biometrics Staffing Safety WannaCry Telephone System The Internet of Things Hiring/Firing Budget Gadgets Sales Data loss Access Physical Security Leadership Managed IT HIPAA Employer Employee Relationship RAM Users Tablet Staff BYOD Files Encryption Hard Drive Remote Support Network Automobile Synergy Microsoft Teams Knowledge Websites Analytics SaaS Wireless Managed IT Service e-waste Processors PowerPoint IT budget Scalability Managing Stress Comparison Networking Emergency IaaS Phone System Telephony disposal Copy Emoji G Suite VoIP 5G Instagram Wireless Technology IBM Paste Samsung Hacker Conferencing eCommerce Customer Relationship Management Network Attached Storage IP Address Online Shopping Customer Service Server Management Mobile Office Cables Domains File Sharing Autocorrect Voice over Internet Protocol User Tip Public Speaking User Security Machine Learning Spam Blocking Lithium-ion battery Tip of the week Windows 10 Augmented Reality Business Technology Telecommute Money Remote Computing Mobile Security Printing Laptop Unified Communications Managed IT Services Competition Telecommuting Operating System Big Data Paper Fun Millennials Environment Upgrade Ink Virtualization Google Drive IT Support Hosted Solution Search Server Scheduling Presentation

Newsletter Sign Up