Out of the Box Solutions Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Out of the Box Solutions at 800-750-4OBS (4627) today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Internet Cloud Efficiency Browser Malware Android Productivity Hardware Communication User Tips Managed IT services Communications Ransomware Saving Money Microsoft Passwords Small Business Data Collaboration Mobile Device Innovation Applications Users Google Business Intelligence Backup Network Blockchain Hosted Solutions Social Media Wi-Fi Mobile Devices Email Employer-Employee Relationship Windows 10 VoIp Business Management Workplace Tips IT Support Wireless Charging Data Backup Outsourced IT Managed IT Service Virtualization Compliance VPN Remote Computing Patch Management Managed IT Services Computer BDR Data Management Information Computers Data recovery Internet of Things Business Tech Terms Save Money Cortana Networking Wireless Automation Hackers Gmail Software Artificial Intelligence Marketing Virtual Assistant IT Services Cost Management Analytics Cloud Computing Bandwidth Twitter Authorization Digital Data loss Millennials Router Managed Service Streaming Media Vulnerability Machine Learning Database Voice over Internet Protocol Plug-In Online Shopping GDPR Environment Update Tablet Government PowerPoint IT Management Conferencing Inventory Unified Communications Spam Business Technology Websites Internet Explorer Backup and Disaster Recovery Downloads Touchscreen Spyware Cybercrime Proactive IT WannaCry Server Management e-waste G Suite Big Data Excel Sports Server Office Data Protection RAM Edge Virus Safety Threat Hard Drives Trends Microsoft Office 365 HP Telecommuting Tactics Remote Monitoring and Management Settings Storage HIPAA Tip of the week disposal Bring Your Own Device Knowledge Office 365 Reporting Content Filtering Mobile Security Microsoft Teams Miscellaneous Antivirus Phishing Printing Comparison SSD A.I. Access Control Document Management Telecommute Microsoft Office IT budget Connectivity Dark Web Hard Drive User Tip Value Hybrid Cloud Amazon Holiday Physical Security Telephony Medical IT Lead Generation Network Attached Storage Operating System Company Culture Staff Data Breach Dongle Paper Specifications Facebook Movies Authentication Paperless Office Smartphone Workers Maintenance Analysis Battery Technology Tips Apps Error Processors Cables eCommerce Laptop Voice over IP SaaS Password Gadgets Managing Stress Troubleshooting Sales Ink Quick Tips Outlook Disaster Recovery Regulation Alert Printers