Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

FBI Definition
The accepted FBI definition of cyberterrorism was offered by now retired Special Agent Mark Pollitt. As a member of the Computer Analysis Response Team (CART), he was on the front lines when cyberthreats began to inundate networks, and defined cyberterrorism as “...the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

The difference between cyberterrorism, and what we typically refer to as cybercrime, is based firmly on intent. For this reason, cyberterrorism has the distinction separate from other cybercrime that it causes physical harm to a person or infrastructure to advance an attacker’s socio-political agenda.

How Attacks Are Carried Out
Think of all the ways that cybercriminals can infiltrate computer networks. Every one of those is open and available to cyber terrorists. They use the most familiar types of attacks, but they aim them at places where it will produce the most chaos. Instead of focusing on direct monetary gain, a cyber terrorist will direct his/her attention to a construct that, if broken, would cause mass panic like power or traffic grids.

Groups of cyber terrorists will disrupt, or sabotage websites and other Internet-based resources owned by organizations that are in active opposition to their views. They also often make coordinated attempts to tamper with military technology and, as mentioned before, public infrastructure, with the idea to terrorize the people on the other end of the system.

Since these black hat groups tend to use the same means as would your typical hacker, the strategies to stop them are very similar. Use the defenses you have available, whether they be hardware, software solutions, or behaviors designed to mitigate your exposure to these types of risks.

Tekie Geek’s security experts can help keep unwanted entities out of your network and keep your business running productively. For more information, contact us today at (347) 830-7322.

Technology Addiction is a Problem in Children and ...
This Week’s Tech Term: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Mobile Device Two-factor Authentication IT Consultant Computer Care Writing Apple Workplace Tips Laptop File Sharing Windows Monitors malware worms Cybersecurity data loss Encryption Cortana Hackers Specifications Trends Laptops Staten Island computer support Outlook Experience Powerful Technology Solutions Social Engineering computer support firms Hardware Solutions Telephone System Hiring/Firing Nanotechnology Upgrade it support Proxy Server Office Apps Microsoft Office Content Bandwidth computer repair Microsoft Facebook Small Business Project Management ransomware attacks Regulation Applications YouTube Network Search Managed IT Services Holiday Word Upload Hard Drive Artificial Intelligence Telephony Error HTML Blockchain Wireless Headphones VoIP Multi-factor Authentication malware Hard disk Addiction Employer-Employee Relationship Entertainment Customer Resource management Download Bluetooth Reliable Computing Miscellaneous Politics Vendor Mangement Management IT consulting firm Black Market Unified Threat Management Technology Bring Your Own Device Deep Learning Analytics Notifications Downloads Tech Term Multi-Factor Security Hacks Devices Taxes Quick Tips Virtual Desktop Hard Drive Disposal Travel LiFi Alert Cabling Streaming Media Hacker Remote Monitoring Hosted Solutions Settings Government email scam IT support Staten Island Bitcoin Displays Cost Management Cloud computing Staten Island Bookmark Device security Cloud Wireless Technology Relocation Thank You Mobile Technology Software as a Service Music Business Metrics Vulnerability Remote Computing User Tip Safety Botnet Computer Malfunction End of Support Unified Communications Website Equifax Private Cloud Advertising IT consulting firms Information Technology Cryptocurrency Staffing Regulations Software Privacy Motion Sickness Browser Tablet Securty Service Level Agreement Legislation Augmented Reality Database Flexibility Scam Disaster Recovery computer services Staten Island Hacking Efficiency Wi-Fi How To BDR Google Calendar Automation Disaster Automobile Customer Service IT services NYC Monitoring Distributed Denial of Service Television Physical Security Going Green Productivity Internet of Things IT consulting Staten Island Documents Budget Training Tablets Education Business Growth Tip of the week Redundancy Ransomware Save Money Update Information Visible Light Communication Virtual Reality Meetings Drones Conferencing Digital Uninterrupted Power Supply Virus Data Breach Big Data CCTV Best Practices IT services New York City Google Drive Webcam Telephone Systems Data Virtualization Smartphones datto VPN Outsourced IT Productivity IT support firms Mouse end-user files computer support Staten Island Society Business Technology Mobile Security Google Wallet History CryptoLocker Law Enforcement User Tips Email Domains Spyware tech support Staten Isalnd Content Filtering IT services Staten Island Mobility IT support NYC Google Docs Maintenance Data Security Managed IT 3D Printing Internet Business Mangement The Internet of Things Tech Support Recovery Web Server Mobile Device Management Fake News IT support Operating System Banking Windows XP Health IT Social Media Administration managed it services Retail today ’s organizations Robot computer support Comparison Computer Managing Stress Cybercrime Backup and Disaster Recovery Tactics Corporate Profile Hardware G Suite Access Hack Patch Management App Start Menu Firewall Communication Windows 8 Microchip IT support Staten Islans Sports Spam Data Management Social Network Samsung Best Practice Language Data storage Printer Security Networking Rental Service Cache Android IT consulting Staten island News Browsers managed IT services staten island Accidental deletion Document Management Processors Printing Lithium-ion battery Congratulations Saving Time Computing Legal Staten Island IT consulting Websites Text Messaging Downtime Memory Hosted Solution Supercomputer Mobile Devices Staten Island tech support Worker Gadgets data recovery Flash Employer Employee Relationship Saving Money Freedom of Information eWaste Printers managed services Staten Island Electronic Medical Records WiFi Office Tips Administrator Proactive IT Software License Data Protection Startup Managed Service Piracy Network Security Chromebook Lenovo Desktop Tip of the Week Microsoft Excel Access Control Staten Island IT support CrashOverride Social Antivirus Collaboration Vulnerabilities Accountants Health Solid State Drive Business Computing Time Management Vendor Management Help Desk Gmail Work/Life Balance Touchscreen Computers staten island managed services Innovation Emails Public Cloud Workers SaaS Business Continuity IT Services computer services Digital Payment Gamification Excel managed services Twitter Compliance Network Congestion Server IT support New York City Vendor Tech Terms Audit Knowledge managed IT services NYC VoIP Company Culture Password Google Cloud Computing Windows 10 Data Analysis Money Wireless Scalability Phishing BYOD Windows 10 IBM Data Backup data recovery Staten Island Smartphone Emergency Managed IT Services IT consulting company Machine Learning Business tech support Staten Island Computing Infrastructure Unified Threat Management Identity Theft Virtual Assistant Backup In Internet of Things IT Management IT consulting NYC tech support computer repair Staten Island Network Management Screen Reader Business Management Managed Service Provider Office 365 Tracking Telephone Business Cards Workstations Running Cable IT consulting Google Maps SharePoint Cleaning computer support NYC Paperless Office Malware PDF communications Passwords DDoS IT Support Username

Newsletter Sign Up