Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (502) 212-2525

Logo

 

Triad IT Blog

Triad IT has been serving the Kentucky area since 1998, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Defining “Cyberterrorism” is Easier Than It Sounds

Defining “Cyberterrorism” is Easier Than It Sounds

The world is unfortunately familiar with the concept of terrorism, the use of fear and menace to intimidate those opposed to your views, beliefs, or goals. However, others may not be as familiar with the concept of cyberterrorism, beyond seeing it on television. For today’s blog, we’ll examine cyberterrorism to gain a better understanding of its methods, and how to protect yourself from it.

The Official View of the U.S. Federal Bureau of Investigation and Others
One accepted definition of cyberterrorism by the FBI was once put to words by (now retired) Special Agent for the FBI Mark Pollitt, one of the first members of the Computer Analysis Response Team. According to Pollitt, cyberterrorism is “... the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

There are many other definitions, but they all follow the same gist - the difference between cyberterrorism and run-of-the-mill cybercrime is based on the intent behind the attack. As a result, cyberterrorism is usually classified as such because it causes physical harm to a person or infrastructure to further a socio-political agenda.

How Cyberterrorism is Leveraged
Cyberterrorists, like other cybercriminals, have no shortage of attack vectors to get their way. There really isn’t any kind of attack that a cybercriminal could leverage that a cyberterrorist couldn’t also use as well.

This means that cyberterrorists will use many familiar tools to get their way, including ransomware, viruses and malware, denial-of-service attacks, and phishing. However, unlike the motivations of other, cash-focused cybercriminals, the cyberterrorist will have a different drive behind their actions.

Oftentimes, groups of cyberterrorists will actively disrupt websites, either to simply cause a nuisance online, or to sabotage those that disagree with their position. It is also a common goal for these groups to tamper with military technology and public infrastructure systems. This last motivation is particularly dangerous, as it could lead to a public health or safety crisis.

How to Protect Yourself
Fortunately, this is where the difference between a cyberterrorist and the typical cybercriminal becomes moot. After all, both use the same tools, they just have different motivations to use them. Therefore, your best defense against finding your business victimized is the same defense you would leverage against any cybercriminal - strong passwords, a secure network, and most importantly, a comprehensive appreciation of the importance of maintaining security standards throughout your business.

We can help you implement the solutions you need to keep your business safe against threats of all kinds. Call Triad IT at (502) 212-2525 today.

How to Avoid Becoming the Next Data Security Cauti...
Tech Term of the Week: Blockchain
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, June 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Collaboration BDR Computers Hybrid Cloud Cloud Networking Congratulations Spyware Company Culture Tip of the week Mobile Devices Router File Sharing Data Management iPhone Settings RAM Environment Email Chrome Android Browser Data Bandwidth Hardware IT Management Windows 10 Thank You Excel Password Employer-Employee Relationship Business Remote Computing Ransomware Artificial Intelligence Safety Saving Money Technology Tips Maintenance Microsoft Data Protection Computer Twitter Operating System Staff e-waste Database User Tips Battery Online Shopping Connectivity Law Enforcement Data loss Business Management Apple Malware eCommerce Outsourced IT Edge Facebook Privacy Innovation Gadgets HP Downloads Google Comparison Communication Blockchain Analytics Network Attached Storage Apps Productivity WannaCry Sports Tip of the Week Mobile Security Telecommuting Server Management Data Backup Tech Terms HIPAA Spam Printing Millennials Telecommute Internet Explorer Conferencing Smartphone Unified Communications Social Media Movies Tech Term Efficiency How To Telephony User Security Managed IT Service Network Security Hackers Content Filtering Software Inventory Alert Internet Lead Generation Wi-Fi Managed IT Services Websites Specifications Antivirus IT budget Paper Applications Cybersecurity User Tip Value Tactics Save Money Dongle Trends Marketing Backup IT Support Business Technology SSD Tablet Wireless Charging Virus Office 365 Patch Management Phishing Document Management Office Paperless Office IT Services Workers Security Best Practices Physical Security Microsoft Teams Vulnerability Processors Knowledge Server Managed IT services Wireless Holiday Hard Drive Cybercrime Virtual Assistant Cortana Virtualization WiFi Hard Drives Communications Cloud Computing Business Computing Big Data Government VPN Laptop Data recovery Internet of Things Hosted Solutions Threat Business Intelligence Passwords Gmail Managing Stress PowerPoint Technology Bring Your Own Device Miscellaneous G Suite Data Breach Voice over IP A.I. Smartphones Streaming Media disposal Ink Automation Backup and Disaster Recovery Cost Management Machine Learning Digital Sales VoIp Small Business

Newsletter Sign Up