888.678.7282    Get SUPPORT

Strata Information Technology Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Strata Information Technology at 888.678.7282 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Network Security Internet Malware Cybersecurity Hackers Communications Tech Term VoIP Ransomware Software Backup Outsourced IT IT Support Productivity Microsoft Passwords Business Management Smartphones Alert Windows 10 Communication Browser User Tips Social Media Business Efficiency Save Money Hardware Hosted Solutions Email Network Data Small Business Data Backup Productivity Phishing Users Google Data Recovery Cloud Computing Data Breach Vulnerability Apps Mobile Device Smartphone IT Services Microsoft Office Internet of Things Android Miscellaneous App Bandwidth Saving Money Twitter Mobile Device Management Workers Patch Management Wi-Fi Collaboration Computer Settings Networking Excel Company Culture Law Enforcement Politics Access Control Compliance BDR Employer-Employee Relationship Innovation Business Continuity Remote Monitoring Scam Office 365 Workplace Tips Applications Cybercrime Blockchain Government Computers Retail Office Personal Information BYOD Managing Stress Automation Antivirus SaaS Managed IT Service Information Dark Web Marketing Chrome Virus Holiday Windows Connectivity Word Education Virtual Assistant Website Vendor Management Entertainment How To Facebook Recovery Spam Wireless Maintenance Password Leadership Access Physical Security Reporting Backup and Disaster Recovery Cables Current Events Shortcut WiFi Managed Service Router Content Filtering Dark Data Plug-In Websites Microsoft Teams HIPAA Avoiding Downtime VoIPMyths Paperless Office Tactics Mobile Devices Artificial Intelligence Trends Two-factor Authentication Computer Care Live Streaming Microsoft Office 365 e-waste Tablet Files Medical IT SSD Voice over Internet Protocol Net Neutrality CrashOverride Telephone Systems Data Protection Cortana Profitability IT budget PowerPoint Gmail Unified Threat Management Proactive IT Remote Support Hard Drive VoIPSavings Digital Internet Explorer Disaster Recovery A.I. Tech Support Gaming Console WhatsApp Managed Service Provider Wireless Charging Cost Management Authentication disposal Knowledge Analytics Managed IT GDPR Inventory Safety Remote Control Eliminating Downtime IT Management Sports Botnet VPN Remote Monitoring and Management Dongle Scalability Phone System Hiring/Firing Processors Employer Employee Relationship Update Edge Threat The Internet of Things Movies Gadgets Budget Video Games Google Maps Lead Generation Authorization Spyware Value Comparison IaaS Emergency Telephony Encryption Storage Amazon Worker Battery Data Management Wireless Internet Tech Terms Television Information Technology Bring Your Own Device Credit Cards Apple Automobile Technology Efficiently Data loss Staffing News HP Smart Technology Multi-Factor Security Specifications Synergy HaaS Printer Server Licensing Voice over IP Error Printer Email Management Yahoo Help Desk Streaming Media Biometrics Regulation Technology Tips Hybrid Cloud Gadget iPhone Outlook Staff RAM Telephone System Hard Drives WannaCry Troubleshooting Document Management Database Business Intelligence Downloads Cleaning Printers Travel Touchscreen Sales DDoS Telecommuting Server Ink Emoji Public Speaking Online Shopping Instagram Presentation Millennials Money Lithium-ion battery Samsung Augmented Reality Machine Learning Wireless Technology 5G Hosted Solution Google Drive IBM IT Support File Sharing User Tip G Suite Hacker Telecommute Copy Customer Relationship Management Fun Mobile Security Competition Windows 10 Spam Blocking User Security Tip of the week IP Address VoIP Laptop Printing Big Data Unified Communications Quick Tips Paste Customer Service Operating System Business Technology Network Attached Storage Remote Computing Autocorrect Mobile Office Virtualization Paper Upgrade Conferencing Managed IT Services Domains Server Management Search eCommerce Scheduling Environment

Newsletter Sign Up