Blog
home
  • Register

Data Net Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Data Net at (760) 466-1200 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, January 21, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity Tech Term Privacy User Tips Internet Smartphones Malware Cybersecurity Cloud Microsoft Android Mobile Device Efficiency Hardware Email Communication Browser Communications Google IT Support Small Business Wi-Fi Data Ransomware Network VoIp Software Backup Social Media Internet of Things Holiday Mobile Devices Data Backup Users Business Management Managed IT services Windows 10 Innovation Cloud Computing Collaboration Applications Data recovery Hosted Solutions Passwords Hackers Wireless IT Services Networking Business Word Outsourced IT Smartphone Workplace Tips Patch Management Saving Money Employer-Employee Relationship Managed IT Services Access Control Blockchain Information Marketing Microsoft Office Medical IT Artificial Intelligence Cortana Password Router Save Money Government Remote Computing Wireless Charging Connectivity Virus How To Managed IT Service Bandwidth Virtual Assistant Virtualization Apps VPN Compliance Physical Security Phishing Miscellaneous BDR Data Management Data Protection Excel Chrome Business Intelligence Gmail Scam Data Breach Tech Terms Cost Management Mobility Computer Computers Facebook Automation Remote Monitoring and Management Travel Network Attached Storage Environment File Sharing Millennials Amazon Botnet Training Edge Specifications Trends Error IT budget Twitter Hybrid Cloud Outlook Help Desk HP Spam Knowledge Battery iPhone Hard Drive Microsoft Teams Gadgets WhatsApp Cybercrime Printing Website Education e-waste Remote Monitoring Security Cameras Dongle Conferencing Lead Generation A.I. Inventory Cables Profitability News Business Continuity Document Management Antivirus SaaS Licensing Processors Company Culture Machine Learning Tactics eCommerce Paper Managed Service Laptop Backup and Disaster Recovery Live Streaming disposal Retail Wearables Office Movies Touchscreen IT Management Mobile Security Law Enforcement Telecommuting Voice over Internet Protocol Eliminating Downtime Telephone System Upgrade Paperless Office Staff GDPR Tech Support User Tip Spyware Managing Stress Sales Online Shopping Ink Hard Drives Server Management Value Office 365 Maintenance Plug-In Remote Support Healthcare Analytics Content Filtering Microsoft Office 365 Alert Vulnerability Operating System BYOD Cleaning Certification Digital Websites Server Streaming Media Storage G Suite Troubleshooting Telecommute Tablet Settings PowerPoint SSD Unified Communications Authentication User Security Telephony Internet Explorer Proactive IT Data Security WannaCry Workers Wireless Internet Safety Comparison Downloads Dark Web Tip of the week Bring Your Own Device Update Data loss Sports Reporting Apple RAM Authorization Congratulations Database Business Technology Voice over IP Threat Big Data Technology Tips HIPAA Quick Tips Analysis Disaster Recovery WiFi Printers Regulation Thank You Personal Information

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123