Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (502) 212-2525



Triad IT Blog

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Triad IT at (502) 212-2525 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, October 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Managed Service Business Threat Wireless Backup and Disaster Recovery Dongle Productivity Knowledge Alert Bandwidth Tech Term Marketing Hard Drive Movies Saving Money Tablet Computers VPN Apps Hardware Millennials Managed IT Service Managed IT services Mobile Security iPhone Paperless Office Maintenance Information Sales Email Spyware Telecommute Network Security Safety Cloud Computing Managed IT Services e-waste Operating System Twitter Tip of the week Business Computing Best Practices Machine Learning Wi-Fi Big Data Amazon Paper Server Management Browser Wireless Charging Save Money Antivirus File Sharing Office Telephony Innovation HIPAA Remote Computing Settings Telecommuting Data Management Database SSD Cost Management Tech Terms RAM Data recovery Regulation Compliance Business Technology Backup Office 365 Cortana A.I. WiFi Company Culture Staff Patch Management Microsoft Teams Microsoft Office Virtualization Environment Proactive IT Inventory Computer Reporting PowerPoint Ransomware Holiday Battery Applications Smartphones Networking Vulnerability Government Hackers Server Connectivity Cybersecurity Analytics Streaming Media Internet eCommerce Technology Virtual Assistant Analysis Password Malware Network Attached Storage Edge Small Business Gmail Law Enforcement Communication Voice over Internet Protocol Business Intelligence WannaCry Data loss IT budget Hard Drives Cloud BDR Mobile Devices Miscellaneous Ink Digital User Tips Users Printing disposal IT Services IT Management Internet Explorer Websites Gadgets Excel Specifications Cybercrime Tactics Trends Sports User Security Facebook VoIp IT Support Plug-In Data Backup Microsoft Thank You Technology Tips Hybrid Cloud Remote Monitoring and Management Data Breach Smartphone Efficiency Android Downloads Lead Generation Network Business Management Social Media Comparison HP Data Protection Google Workers How To Data Automation Spam Workplace Tips Collaboration Voice over IP Router Tip of the Week Security Value G Suite Laptop Passwords Managing Stress Phishing Conferencing Employer-Employee Relationship Outsourced IT Processors Congratulations Hosted Solutions Document Management Online Shopping Content Filtering Bring Your Own Device Cables Chrome User Tip Privacy Blockchain Physical Security Internet of Things Artificial Intelligence Virus Software Windows 10 Apple Unified Communications Communications

Newsletter Sign Up