facebook linkedin twitter

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

FBI Definition
The accepted FBI definition of cyberterrorism was offered by now retired Special Agent Mark Pollitt. As a member of the Computer Analysis Response Team (CART), he was on the front lines when cyberthreats began to inundate networks, and defined cyberterrorism as “...the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

The difference between cyberterrorism, and what we typically refer to as cybercrime, is based firmly on intent. For this reason, cyberterrorism has the distinction separate from other cybercrime that it causes physical harm to a person or infrastructure to advance an attacker’s socio-political agenda.

How Attacks Are Carried Out
Think of all the ways that cybercriminals can infiltrate computer networks. Every one of those is open and available to cyber terrorists. They use the most familiar types of attacks, but they aim them at places where it will produce the most chaos. Instead of focusing on direct monetary gain, a cyber terrorist will direct his/her attention to a construct that, if broken, would cause mass panic like power or traffic grids.

Groups of cyber terrorists will disrupt, or sabotage websites and other Internet-based resources owned by organizations that are in active opposition to their views. They also often make coordinated attempts to tamper with military technology and, as mentioned before, public infrastructure, with the idea to terrorize the people on the other end of the system.

Since these black hat groups tend to use the same means as would your typical hacker, the strategies to stop them are very similar. Use the defenses you have available, whether they be hardware, software solutions, or behaviors designed to mitigate your exposure to these types of risks.

Computerware’s security experts can help keep unwanted entities out of your network and keep your business running productively. For more information, contact us today at (703) 821-8200.

Technology Addiction is a Problem in Children and ...
This Week’s Tech Term: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Virtualization Network Microsoft Office Android Mobile Office Social Media VoIP Mobile Device Management Server Collaboration Communication Miscellaneous Smartphone Upgrade Ransomware Windows 10 Data Backup Unified Threat Management Windows Data Recovery Operating System IT Support Passwords Remote Monitoring Tech Term BYOD Managed IT services Remote Computing Holiday Vendor Management Mobile Computing Facebook communications Productivity WiFi Cybersecurity Apps BDR The Internet of Things Analytics Marketing History Users Apple Automation Firewall Data Management Phishing Alert Mobile Device Managed IT Services Outsourced IT Internet of Things App IT Consultant Artificial Intelligence Browser Save Money Spam Bandwidth Antivirus Maintenance Encryption Gmail Content Filtering Health Office Going Green Big data Bring Your Own Device Search Office 365 Managed IT Hiring/Firing Printer Hard Drives Virus Budget Tech Support Two-factor Authentication Lithium-ion Battery Best Practice Information Technology Cybercrime Help Desk Outlook Windows 8 Cost Management Wireless Technology Money Document Management Training Saving Time Computers VPN Travel Phone System Recovery IBM Employer-Employee Relationship Business Technology Update Cloud Computing Hacking Law Enforcement Administration Windows 10 Humor Compliance Data storage Proactive IT Running Cable Customer Service Access Control Networking Legal Intranet Website Education Government It Management Regulations Hard Drive Risk Management SaaS Save Time Securty Data Breach Hacker Downtime Comparison Tablet Solid State Drive Project Management Company Culture User Avoiding Downtime Flexibility Computer Repair Machine Learning Black Market Social Networking Telephone Systems Laptop iPhone Wireless Business Growth Information Twitter DDoS File Sharing Excel Current Events Data Security Customer Relationship Management Paperless Office Sports Mobility Augmented Reality Patch Management Blockchain Word Data Loss Social Engineering Computing PowerPoint Disaster End of Support Business Intelligence Password Cortana Hosted Solution Fax Server Robot Applications Digital Payment IT service Router How To Computer Accessories Download Managed Service Private Cloud Processors Digital Conferencing USB Trending Telephony Presentation Websites Bluetooth Mouse Taxes Inbound Marketing Start Menu Tech Terms Mobile Technology Specifications Safety Cryptocurrency Monitoring Distributed Denial of Service Virtual Desktop Google Docs Statistics Software as a Service Programming Social Pain Points Public Cloud Network Congestion Documents Experience Uninterrupted Power Supply Monitors Cleaning Management Heating/Cooling Office Tips Storage Vendor Bitcoin Identity Theft Streaming Media Data Protection Vulnerabilities User Error YouTube Google Maps Co-managed IT Healthcare Politics Retail Unified Communications Settings Virtual Reality Net Neutrality Emails Gaming Console Automobile eWaste Chrome Value Scam Chromebook Lifestyle Text Messaging Redundancy Computing Infrastructure Hack Webcam VoIP Piracy Upload Rental Service Meetings HIPAA Touchscreen News Smart Tech Distribution Environment External Harddrive online Currency Web Server Competition Best Practives switches Consultation Writing Evernote HTML Cabling Electronic Payment Music Knowledge Fiber-Optic Database Thin CLient Upgrades Technology Tips Mobile Security Books Workers Business Owner 3D Ebay Proxy Server Virtual Assistant Telephone System Wi-Fi Administrator Audit Software License Trends LinkedIn Supercomputer IP Address Electronic Medical Records LiFi Fake News Multi-Factor Security Cost Smart Phones Microserver Microchip Application Data Warehousing Devices Worker Human Resources Fraud Tactics Leadership Get More Done Access Deep Learning UTM Content Reading Skype Samsung Adminstration Pirating Information Dark Web Emergency Work/Life Balance Hard Drive Disposal Archive Computer Care IT Plan Enterprise Resource Planning Employer Employee Relationship Printer Server Health IT Visible Light Communication Memory Microsoft Excel Legislation Error G Suite Turn Key Hacks Physical Security Digital Signature Trojan IT consulting Google Drive Windows Server 2008 Accountants A.I. Point of Contact Licensing email scam Addiction Spyware Mobile Payment Multi-factor Authentication Relocation Tablets Entertainment Organize Bookmark Vulnerability Banking Botnet Teamwork CIO Electricity Printing Migration Connected Devices Advertising Flash Wireless Headphones Telephone Sync Network Management Recycling Notifications CCTV Upselling Windows XP Windows 7 Equifax Fleet Tracking Analytic PDF Staffing Google Wallet Keyboard cache Displays Television Device security MSP Reliable Computing Product Reviews Video Surveillance Browsers Society Business Metrics Computer Malfunction Best Available WannaCry Micrsooft Downloads Desktop Finance Domains Webinar User Tip Nanotechnology Social Network In Internet of Things Read Saving ZTime Drones Business Cards Service Level Agreement Public Speaking Time Management Freedom of Information Startup Asset Tracking Corporate Profile Motion Sickness Shortcut Harddrive Assessment SharePoint Username Scalability Debate Unified Threat Management Backup and Disaster Recovery Device Management Google Calendar Gamification Messenger Business Managemenet Tracking Troubleshooting GPS Permissions Language Tip of the week Screen Reader Customer Resource management Content Management Entrepreneur Managing Stress Capital Regulation Productuvuty 3D Printing Data Analysis CrashOverride Printers