Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

FBI Definition
The accepted FBI definition of cyberterrorism was offered by now retired Special Agent Mark Pollitt. As a member of the Computer Analysis Response Team (CART), he was on the front lines when cyberthreats began to inundate networks, and defined cyberterrorism as “...the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

The difference between cyberterrorism, and what we typically refer to as cybercrime, is based firmly on intent. For this reason, cyberterrorism has the distinction separate from other cybercrime that it causes physical harm to a person or infrastructure to advance an attacker’s socio-political agenda.

How Attacks Are Carried Out
Think of all the ways that cybercriminals can infiltrate computer networks. Every one of those is open and available to cyber terrorists. They use the most familiar types of attacks, but they aim them at places where it will produce the most chaos. Instead of focusing on direct monetary gain, a cyber terrorist will direct his/her attention to a construct that, if broken, would cause mass panic like power or traffic grids.

Groups of cyber terrorists will disrupt, or sabotage websites and other Internet-based resources owned by organizations that are in active opposition to their views. They also often make coordinated attempts to tamper with military technology and, as mentioned before, public infrastructure, with the idea to terrorize the people on the other end of the system.

Protection
Since these black hat groups tend to use the same means as would your typical hacker, the strategies to stop them are very similar. Use the defenses you have available, whether they be hardware, software solutions, or behaviors designed to mitigate your exposure to these types of risks.

Voyage Technology’s security experts can help keep unwanted entities out of your network and keep your business running productively. For more information, contact us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Phishing Email Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Cybersecurity Small Business Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service VoIP Smartphones Android Business Management Mobile Devices communications Upgrade Disaster Recovery Browser Data Recovery Social Media Windows Managed IT Services Microsoft Office Current Events Network Remote Tech Term Productivity Internet of Things Automation Artificial Intelligence Facebook Gadgets AI Covid-19 Cloud Computing Remote Work Server Managed Service Provider Miscellaneous Information Holiday Outsourced IT Spam Encryption Employee/Employer Relationship Training Compliance Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Mobile Office Two-factor Authentication IT Support Employer-Employee Relationship App BYOD Mobile Device Management Managed Services Voice over Internet Protocol Chrome Gmail Budget Apple Networking How To BDR HIPAA Applications Hacker Computing Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing Tip of the week WiFi Router Operating System Computers Risk Management Virtual Private Network Website Help Desk Health Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Big Data Managed IT Services Microsoft 365 Solutions Going Green Patch Management Save Money Remote Monitoring Customer Service End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Display Printer 2FA Monitoring Paperless Office Excel Infrastructure Firewall Remote Workers Document Management Telephone The Internet of Things Cooperation Free Resource Scam Project Management Data loss Social Windows 7 Telephone System Multi-Factor Authentication Mobility Cost Management Customer Relationship Management Robot Employees Settings Hacking Wireless Integration Printing Presentation Content Filtering User Tip Modem IT Management YouTube Meetings Processor Mobile Security VPN Wireless Technology Holidays Cryptocurrency Computer Repair Data Storage Smart Technology Supply Chain Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Word Saving Time Virtual Machines Professional Services Outlook Machine Learning Managed IT Service Money Humor Downloads iPhone Safety Licensing Maintenance Sports Entertainment Vulnerabilities Antivirus Data Privacy Mouse Images 101 Administration Organization Social Networking Legislation Shortcuts Best Practice IBM Alert Buisness File Sharing Dark Data Fileless Malware Digital Security Cameras Smart Devices Ransmoware Managed IT Wearable Technology Memory Vendors Legal IT solutions How To Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Business Growth Notifications Travel Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Techology Google Maps Competition Cortana Trend Micro Specifications Security Cameras Workplace Strategies Alt Codes Downtime Unified Threat Management Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Unified Threat Management Hosted Solution Username User eCommerce Black Friday SSID Typing Network Congestion Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Google Drive User Error Media Knowledge Proxy Server Reviews Cookies Cyber Monday Medical IT IP Address Point of Sale 5G Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Google Docs Unified Communications Experience Recovery Shopping Nanotechnology Optimization PowerPoint Bitcoin Network Management Running Cable Tech Support Google Wallet Hard Drives Monitors Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Domains Management PCI DSS Laptop Websites Gig Economy Screen Reader Distributed Denial of Service Workplace Windows 8 Drones Refrigeration Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Identity SharePoint Evernote Paperless Public Speaking Electronic Medical Records Halloween Bookmark Smart Tech Memes Co-managed IT Lithium-ion battery Alerts SQL Server Technology Care Lenovo Writing Entrepreneur Download Net Neutrality Financial Data History Business Communications Virtual Reality Scary Stories Private Cloud Browsers Smartwatch Connectivity IT Break Fix Scams Hacks Server Management Azure Hybrid Work Superfish Identity Theft Undo Fun Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Deep Learning Twitter Error CES IoT Communitications Dark Web Cables Education Social Engineering Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Remote Computing Application Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Mobile Computing Staff Value Business Intelligence Tablet Search Gamification Flexibility

Blog Archive