631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Suffolk Computer Consultants at 631-905-9617 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Cloud Privacy Business Computing Technology Cybersecurity Malware Managed IT Services Hardware Backup Communications Network Security Ransomware Business Microsoft Outsourced IT Hackers Alert Email Wi-Fi Android Passwords Software Save Money Business Management Smartphones Router Hosted Solutions Small Business Twitter Smartphone Internet VoIP Applications Productivity Mobile Devices VoIP Password Data Breach Settings Employer-Employee Relationship Miscellaneous Government Google Social Media Data Backup Data Management Bandwidth Windows 10 Phishing Cloud Computing Computer Communication Vulnerability Microsoft Office IT Services Office Excel Spam Mobile Device Management Data Recovery Analytics Law Enforcement Wireless Charging Data Protection Business Intelligence Cybercrime WiFi Data Windows Apps Battery Productivity Gadgets Browser App Remote Computing Internet of Things Tip of the week VPN Innovation Virus Blockchain User Tips Word Cost Management Virtualization Computers Wireless Politics How To Automation Holiday Physical Security Business Continuity Scam Cortana Patch Management Efficiency Managed IT Services Hacking Tech Terms BDR IT Support Retail Workers Chrome Office 365 Website Access Control Remote Monitoring Saving Money Paperless Office IT Support Managed IT Hard Drives Online Shopping Tactics Licensing Document Management Phone System iPhone Artificial Intelligence Paste Automobile Office Tips Content Filtering SSD Internet Explorer Two-factor Authentication Travel Digital Machine Learning Gmail Inventory Gadget Lead Generation Threat Tech Support Live Streaming Edge File Sharing Telecommute Facebook Telephone Systems Spotify Google Maps Safety User Tip Mobile Security Disaster Recovery Dark Web Printer Server Cleaning Shortcut Hiring/Firing Virtual Assistant Printing WhatsApp Laptop User Security Data loss Remote Control Operating System Big Data Printers CrashOverride Paper Business Technology Staff Spam Blocking Telecommuting Environment Smart Technology WannaCry Education Ink News Sales Websites Email Management Botnet Millennials e-waste HIPAA Server PowerPoint Telephone System IT budget Tablet Networking Managed IT Service disposal Hard Drive Staffing Sports IT Management Knowledge Dongle Information Technology Telephony Value Files Processors Entertainment Marketing Recovery Collaboration Connectivity Remote Support Comparison Maintenance Google Drive Biometrics Voice over IP Tech Term Spyware Hosted Solution Work/Life Balance Network Attached Storage Specifications Technology Tips Antivirus Access eCommerce Database HP Server Management Copy Apple Conferencing Backup and Disaster Recovery Company Culture Multi-Factor Security BYOD SaaS Scalability Trends Public Speaking Synergy IaaS Encryption Credit Cards Lithium-ion battery Mobile Device Augmented Reality Emoji HaaS Vendor Management The Internet of Things Unified Threat Management Scheduling Budget Competition Current Events Samsung Fun Computer Care Instagram Users Net Neutrality Upgrade Gaming Console Freedom of Information Search Windows 10 Video Games Presentation Worker Yahoo Television 5G Wireless Technology Printer Autocorrect Managed Service Provider IBM Avoiding Downtime Hacker Dark Data Customer Relationship Management Leadership Streaming Media IP Address DDoS Money Customer Service Emergency Personal Information Network Employer Employee Relationship Downloads Mobile Office Domains

Newsletter Sign Up