631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Suffolk Computer Consultants at 631-905-9617 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Productivity Microsoft Backup Smartphones Hardware Hosted Solutions Communication Passwords Hackers Internet VoIP Email Ransomware Small Business Software Browser Business Management Google User Tips Android Efficiency Business Outsourced IT Wi-Fi Save Money Alert Social Media Collaboration Twitter Computer Data Smartphone Microsoft Office Employer-Employee Relationship Bandwidth Data Backup Innovation Data Recovery Miscellaneous Windows 10 Saving Money Cloud Computing Router Business Intelligence Applications Blockchain Vulnerability Password Mobile Devices Workplace Tips Internet of Things Excel Office IT Support Apps Government Network Access Control Automation IT Services Analytics Gadgets Data Management VoIP Phishing Users Virtualization Data Breach Managed IT Services BDR Mobile Device Settings Patch Management Mobile Device Management Retail Battery Dark Web Cortana VPN Computers Workers Compliance App Tip of the week Remote Computing Hacking Chrome Artificial Intelligence Virus Marketing Company Culture Paperless Office Productivity Networking Politics Word Cost Management IT Support Remote Monitoring How To Website Office 365 Windows Law Enforcement Information Tech Terms Holiday Wireless Charging WiFi Cybercrime Business Continuity Physical Security Managed IT Service Scam Data Protection Gmail Virtual Assistant Wireless Spam Hybrid Cloud Disaster Recovery Live Streaming Google Maps Paper Recovery Knowledge GDPR Technology Tips Maintenance Files Telephony HP Database Cleaning Printers Telephone Systems File Sharing Managed Service Staff RAM CrashOverride User Tip Authorization WannaCry Environment Access Remote Support Server Management Downloads Two-factor Authentication Backup and Disaster Recovery WhatsApp Ink Google Drive Comparison Storage Antivirus Voice over IP Document Management Spotify Tactics Remote Control User Security Websites Microsoft Teams HIPAA e-waste BYOD Hosted Solution Plug-In Trends Tech Support Specifications Error Hiring/Firing SSD Safety Education Smart Technology Cables IT budget PowerPoint Phone System eCommerce Digital Internet Explorer Spam Blocking Business Technology Managing Stress Telecommuting Troubleshooting Hard Drive Work/Life Balance disposal SaaS Copy Apple Proactive IT Machine Learning A.I. Multi-Factor Security Conferencing Touchscreen Inventory Managed IT News Voice over Internet Protocol IT Management Sports Licensing Online Shopping Edge Office Tips Threat Automobile Big Data Staffing Email Management Sales Reporting Dongle Botnet G Suite Millennials Update Processors Value Paste iPhone Remote Monitoring and Management Telecommute Movies Content Filtering Microsoft Office 365 Lead Generation Mobile Security Information Technology Telephone System Connectivity Gadget Travel Laptop Printing Tablet Medical IT Hard Drives Bring Your Own Device Outlook Spyware Printer Server Analysis Data loss Unified Communications Authentication Server Operating System Entertainment Biometrics Amazon Network Attached Storage Streaming Media Facebook Shortcut Autocorrect Unified Threat Management Windows 10 Avoiding Downtime Public Speaking Scheduling Presentation Leadership Dark Data Current Events Lithium-ion battery Samsung Augmented Reality Computer Care Managed Service Provider Net Neutrality Quick Tips Instagram Wireless Technology 5G Personal Information DDoS Money IBM Hacker Emergency Employer Employee Relationship The Internet of Things Gaming Console Regulation Fun Budget Competition Freedom of Information Customer Relationship Management Scalability IP Address Synergy Video Games Worker IaaS Encryption Television Yahoo Customer Service Credit Cards Mobile Office Emoji Upgrade Printer Domains HaaS Search Vendor Management

Newsletter Sign Up