Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

FBI Definition
The accepted FBI definition of cyberterrorism was offered by now retired Special Agent Mark Pollitt. As a member of the Computer Analysis Response Team (CART), he was on the front lines when cyberthreats began to inundate networks, and defined cyberterrorism as “...the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

The difference between cyberterrorism, and what we typically refer to as cybercrime, is based firmly on intent. For this reason, cyberterrorism has the distinction separate from other cybercrime that it causes physical harm to a person or infrastructure to advance an attacker’s socio-political agenda.

How Attacks Are Carried Out
Think of all the ways that cybercriminals can infiltrate computer networks. Every one of those is open and available to cyber terrorists. They use the most familiar types of attacks, but they aim them at places where it will produce the most chaos. Instead of focusing on direct monetary gain, a cyber terrorist will direct his/her attention to a construct that, if broken, would cause mass panic like power or traffic grids.

Groups of cyber terrorists will disrupt, or sabotage websites and other Internet-based resources owned by organizations that are in active opposition to their views. They also often make coordinated attempts to tamper with military technology and, as mentioned before, public infrastructure, with the idea to terrorize the people on the other end of the system.

Since these black hat groups tend to use the same means as would your typical hacker, the strategies to stop them are very similar. Use the defenses you have available, whether they be hardware, software solutions, or behaviors designed to mitigate your exposure to these types of risks.

Tekie Geek’s security experts can help keep unwanted entities out of your network and keep your business running productively. For more information, contact us today at (347) 830-7322.

Technology Addiction is a Problem in Children and ...
This Week’s Tech Term: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Small Business Data Analysis Operating System BDR Update Customer Resource management IT consulting firm Business Text Messaging Data Outsourced IT Entertainment Flexibility Vendor Management VPN Employer Employee Relationship Unified Threat Management Paperless Office Tablets Business Mangement Staten Island computer support Innovation IT consulting Staten island Relocation Electronic Medical Records Supercomputer end-user files Documents Telephone Systems Cache Productivity Equifax Printers Desktop Tip of the week Google Calendar Distributed Denial of Service Touchscreen Google Wallet Machine Learning Sports Solid State Drive Managed Service Provider Work/Life Balance Project Management computer repair Website IBM Saving Time Two-factor Authentication Computer Care The Internet of Things Public Cloud Firewall Social Media IT support DDoS Hackers Automobile Corporate Profile Cybersecurity Productivity Term Social Cloud Computing Virtual Assistant CryptoLocker Tech Support Notifications Windows 10 Malware Hard Drive Social Engineering Uninterrupted Power Supply Physical Security Managed Service Administration IT support Staten Islans Hiring/Firing User Tip SharePoint History tech support Staten Isalnd Tech Terms Service Level Agreement Technology Screen Reader Staten Island IT support Mobile Device tech support Staten Island Error Robot Start Menu CrashOverride Web Server Accountants IT Services Monitoring Lithium-ion battery Chromebook Worker Thank You Conferencing IT Management computer support firms Management Downloads tech support Mobile Security Unified Communications Workers Processors Running Cable Computer Malfunction Data Management Microsoft Excel eWaste Domains Quick Tips Telephone Monitors IT consulting firms Username data recovery Android End of Support Travel Modem Regulations Best Practice Managed IT Lenovo Evernote Freedom of Information Wi-Fi Miscellaneous Ransomware Laptops Computing Retail BYOD managed IT services NYC Visible Light Communication Cabling it support Apple Tech Term Word Document Management Emails Google Downtime Managing Stress Scam Disaster Blockchain Device security Society Deep Learning Vendor Mangement Network Management VoIP Unified Threat Management Information Technology Safety Securty Health IT services New York City Congratulations Directions Processor Best Practices Managed IT Services SSID computer services IT support NYC Workstations staten island managed services Bandwidth File Sharing Windows 8 Content Wireless Saving Money Software Excel Multi-factor Authentication In Internet of Things Bookmark Windows XP Trends today ’s organizations Access Hardware Knowledge Time Management datto Customer Service communications Vendor Business Computing Company Culture computer services Staten Island Users Router Apps Analytics Administrator Government Internet of Things Computing Infrastructure Microsoft Startup Computers Staten Island IT consulting IT consulting Staten Island Bluetooth Communication Television Websites Google Drive Hacking Virus Windows Augmented Reality Applications IT support firms Search IT consulting Security Cameras Disaster Recovery data loss Samsung Piracy Twitter Identity Theft IT support New York City Comparison Backup Proxy Server Big Data Spam Social Network Cloud Virtual Desktop Patch Management Advertising Smartphone Healthcare Automation Download Passwords LiFi Mobile Technology Writing IT services NYC Staten Island tech support Data storage Hard Drive Disposal App Money Health IT Telephony Maintenance Digital Software License Tip of the Week Gamification Bitcoin Training CCTV Multi-Factor Security User Tips Google Maps Business Metrics Backup and Disaster Recovery Employer-Employee Relationship data recovery Staten Island Hosted Solutions Content Filtering Mouse Politics Specifications Language Hosted Solution Virtualization ransomware attacks Regulation Data Backup YouTube Cost Management Collaboration Software as a Service Staffing Microchip Tech Efficiency computer support NYC WiFi Audit Business Management Drones Help Desk Cybercrime Office Fileless Malware Wireless Technology Google Docs Phishing IT services Staten Island Scalability Banking Displays Cloud computing Staten Island Network Security Legal Browsers Budget Information Facebook managed IT services staten island Microsoft Office Cleaning Printer Encryption Bring Your Own Device Windows 10 Cortana Black Market Hardware Solutions Smartphones Alert Outlook Office 365 Data Breach Server Mobile Devices Vulnerability Recovery Internet Experience IT Consultant Webcam 3D Printing Going Green Streaming Media Workplace Tips Google Play Office Tips computer support Tactics IT Support Remote Computing Data Security Network Meetings Nanotechnology VoIP Settings Proactive IT Botnet Security Database Business Technology Networking email scam Wireless Headphones Access Control Managed IT Services Spyware IT consulting NYC Hack Emergency Fake News Cryptocurrency Motion Sickness Hacker Memory Digital Payment Rental Service Reliable Computing malware Hard disk IT consulting company News G Suite managed services HTML Antivirus Printing Virtual Reality Business Growth Browser Business Cards Education managed it services Addiction Privacy Artificial Intelligence How To Powerful Technology Solutions Data Protection Mobile Device Management Private Cloud Save Money Taxes Remote Monitoring Navigation Flash Law Enforcement Telephone System computer repair Staten Island Laptop Legislation Mobility Gadgets PDF Holiday Tracking Email IT support Staten Island computer support Staten Island Computer Compliance Upgrade Upload Gmail Network Congestion SaaS managed services Staten Island Accidental deletion Redundancy Devices Hacks Tablet malware worms Vulnerabilities Password Music Business Continuity

Newsletter Sign Up