631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Suffolk Computer Consultants at 631-905-9617 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Tech Term Backup Network Security Microsoft Smartphones Hardware Passwords Communication Ransomware Software Business Management Hackers Outsourced IT Hosted Solutions Business Wi-Fi Email Productivity Small Business Google Android Alert Social Media Save Money VoIP Smartphone Computer Employer-Employee Relationship Microsoft Office Data Backup Router Data Recovery Business Intelligence Applications Twitter Internet Collaboration Government Data IT Support IT Services Excel Internet of Things Apps Data Management Office Phishing Network Automation Browser Virtualization Analytics BDR VoIP Bandwidth Innovation User Tips Miscellaneous Windows 10 Saving Money Cloud Computing Password Blockchain Settings Data Breach Patch Management Vulnerability Efficiency Mobile Devices Hacking Retail Artificial Intelligence Paperless Office Cost Management Networking Workers Tip of the week Remote Computing IT Support VPN Chrome Information Access Control Virus Productivity Remote Monitoring Word Law Enforcement Gadgets Holiday Company Culture WiFi Cybercrime Politics Tech Terms Scam Website How To Office 365 Compliance Virtual Assistant Wireless Charging Windows Physical Security Managed IT Service Battery Data Protection Cortana Business Continuity Managed IT Services Wireless Gmail Spam Mobile Device Management App Computers Websites Recovery Microsoft Teams Dark Web User Tip Document Management Tactics Disaster Recovery Two-factor Authentication Remote Support Voice over Internet Protocol Cleaning Trends Printers Google Drive Comparison Reporting HIPAA e-waste Maintenance WhatsApp Hiring/Firing Remote Monitoring and Management SSD CrashOverride Voice over IP IT budget PowerPoint Access Remote Control User Security Work/Life Balance Managing Stress Digital Internet Explorer Hosted Solution Tech Support Machine Learning A.I. Safety Specifications Medical IT Hard Drive Antivirus disposal Managed IT Business Technology Analysis Office Tips Automobile Inventory eCommerce Botnet IT Management Sports BYOD Marketing Spam Blocking Dongle G Suite Phone System Telecommuting Edge Education Threat Smart Technology Copy Apple Amazon Telecommute Movies Multi-Factor Security Conferencing GDPR Processors Value News Email Management Sales Managed Service Lead Generation Mobile Security Big Data Licensing Online Shopping Hard Drives SaaS Connectivity Bring Your Own Device Millennials Laptop Printing Users Paste iPhone Workplace Tips Server Data loss Unified Communications Staffing Content Filtering Spyware Telephone System Tablet Google Maps Operating System Travel Network Attached Storage Streaming Media Technology Tips Hybrid Cloud Gadget Paper Information Technology Plug-In Staff RAM HP Database Cables Downloads Printer Server Knowledge WannaCry Environment Live Streaming Server Management Proactive IT Spotify Backup and Disaster Recovery Facebook Shortcut Files Telephony Entertainment Ink Biometrics Telephone Systems File Sharing Instagram Presentation DDoS Unified Threat Management Lithium-ion battery Money Employer Employee Relationship Current Events Augmented Reality Leadership Wireless Technology 5G Fun Computer Care Freedom of Information IBM Net Neutrality The Internet of Things Emergency Personal Information Hacker Budget Encryption Gaming Console Competition Yahoo Customer Relationship Management IP Address Scalability Search Mobile Device Vendor Management Video Games Storage Synergy Customer Service Mobile Office Worker Upgrade Autocorrect IaaS Avoiding Downtime Credit Cards Domains Television Scheduling Error Dark Data Emoji Regulation Samsung Printer Windows 10 HaaS Public Speaking Managed Service Provider

Newsletter Sign Up