631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Suffolk Computer Consultants at 631-905-9617 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity Cybersecurity Malware User Tips Managed IT Services Tech Term Backup Smartphones Communications Microsoft Hackers Efficiency Hardware Internet Passwords Communication Software Browser Business Business Management Ransomware Google Android Outsourced IT Email Hosted Solutions Small Business Data Backup VoIP Mobile Device Wi-Fi Data Recovery Save Money Applications Microsoft Office Smartphone Collaboration IT Services Innovation IT Support Internet of Things Social Media Holiday Network Windows 10 Cloud Computing Data Alert Apps Twitter Managed IT Services Users Employer-Employee Relationship Miscellaneous Saving Money Access Control Wireless Router Mobile Devices Bandwidth Computer Password Business Intelligence Settings Patch Management Data Breach Marketing Vulnerability Business Continuity Gadgets Government BDR Blockchain Data Management Information Excel Phishing Office Virtualization Word Automation Analytics Workplace Tips Networking VoIP Gmail Productivity App Hacking Tech Terms Connectivity Dark Web Facebook Paperless Office Retail Cost Management Website Office 365 IT Support Virtual Assistant Remote Monitoring and Management Tip of the week Remote Computing Chrome VPN Workers Virus Remote Monitoring Medical IT Law Enforcement Computers BYOD Spam Mobile Device Management WiFi Cybercrime Mobility Scam Artificial Intelligence Company Culture Managed Service How To Politics Wireless Charging Battery Data Protection Cortana Windows Compliance Physical Security Managed IT Service Edge Threat Information Technology Plug-In Safety Dongle G Suite Gadget Cables Security Cameras Knowledge Spotify Telecommute Movies Error Live Streaming Processors Value Telephone Systems File Sharing Printer Server Files Telephony Lead Generation Mobile Security Wireless Internet Hiring/Firing Laptop Printing Entertainment Biometrics Proactive IT User Tip Bring Your Own Device Shortcut Troubleshooting Remote Support Disaster Recovery Voice over Internet Protocol Wearables Google Drive Comparison Data loss Unified Communications Recovery Touchscreen Big Data WhatsApp Spyware Help Desk Remote Control User Security Work/Life Balance Network Attached Storage Streaming Media Cleaning Printers Reporting Voice over IP Operating System Maintenance Managed IT Paper Access Technology Tips Hybrid Cloud CrashOverride Update Hosted Solution Database Healthcare Specifications Office Tips Automobile Staff RAM Microsoft Office 365 Upgrade Botnet HP Certification Spam Blocking Business Technology Server Management Downloads eCommerce WannaCry Environment Antivirus Ink Analysis Telecommuting Backup and Disaster Recovery Outlook Copy Apple Document Management Tactics Education Smart Technology Amazon Data Security Multi-Factor Security Conferencing Websites Microsoft Teams Phone System Authentication News Hard Drives Email Management Sales Trends GDPR Licensing Online Shopping HIPAA e-waste iPhone Server IT budget PowerPoint SaaS Millennials SSD Profitability Two-factor Authentication Paste Digital Internet Explorer Content Filtering Google Maps Managing Stress Authorization Telephone System Training Tablet Machine Learning A.I. Staffing Storage Travel Hard Drive disposal IT Management Sports Inventory Eliminating Downtime Tech Support Television Samsung Credit Cards Quick Tips IBM Hacker The Internet of Things Managed Service Provider Emoji Budget Instagram HaaS Regulation DDoS Printer Money Competition Customer Relationship Management Unified Threat Management IP Address Employer Employee Relationship Fun Leadership Freedom of Information Current Events Customer Service Mobile Office Computer Care Domains Emergency Encryption Personal Information Yahoo Net Neutrality Windows 10 Gaming Console Public Speaking Search Vendor Management Presentation Autocorrect Lithium-ion battery Scalability Avoiding Downtime Video Games Augmented Reality Synergy Scheduling IaaS Wireless Technology 5G Dark Data Worker

Newsletter Sign Up