Out of the Box Solutions Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Out of the Box Solutions at 800-750-4OBS (4627) today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Privacy Productivity Internet Smartphones Cybersecurity Efficiency Communication Malware Hardware Microsoft Mobile Device Browser Android Cloud Data Email Ransomware Small Business Network IT Support Wi-Fi Communications Mobile Devices Data recovery Internet of Things Applications Users Wireless Backup Saving Money Holiday Business Management Managed IT services Collaboration Innovation Data Backup Google Passwords Windows 10 IT Services Information Outsourced IT Networking Business Hackers Social Media Managed IT Services Workplace Tips Cloud Computing Employer-Employee Relationship Business Intelligence VoIp Blockchain Software Marketing Hosted Solutions Remote Monitoring and Management Computers Save Money Managed IT Service Tech Terms Microsoft Office Access Control Remote Computing Connectivity Patch Management Automation Computer Medical IT Smartphone Facebook Apps Artificial Intelligence Analytics Bandwidth Virtual Assistant Password Cost Management Cortana Managed Service Mobility Wireless Charging Gmail Compliance Virtualization VPN BDR Data Management HP Tactics Millennials Business Continuity Settings Hard Drives Trends Microsoft Office 365 disposal Bring Your Own Device Profitability Storage HIPAA Miscellaneous Antivirus Printing Tablet Reporting Word Mobile Security Microsoft Teams Document Management Telecommute Business Technology Upgrade IT budget SSD A.I. Conferencing Value Hybrid Cloud Amazon Eliminating Downtime Physical Security Dark Web Hard Drive Staff Dongle Paper Excel Wearables Lead Generation Network Attached Storage Operating System Company Culture Office Authentication Paperless Office Maintenance Analysis Certification Battery Movies Cables Telecommuting BYOD eCommerce Laptop Technology Tips Error Processors Managing Stress Tip of the week Troubleshooting Ink Knowledge SaaS Office 365 Healthcare Content Filtering Authorization Digital Data loss Router Phishing Twitter Database Voice over Internet Protocol Plug-In Wireless Internet Online Shopping Streaming Media Comparison Vulnerability Machine Learning Environment User Tip Update Government PowerPoint GDPR Telephony Data Security Spam Websites Internet Explorer Data Breach Training IT Management Inventory Unified Communications Cybercrime Proactive IT Workers Help Desk Backup and Disaster Recovery Downloads Specifications Touchscreen Spyware e-waste G Suite Outlook Big Data Sports Voice over IP WannaCry Server Management Gadgets Edge Virus Safety Threat Sales Security Cameras Server Data Protection RAM Alert Printers Quick Tips Personal Information Disaster Recovery Regulation