Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

A Close Examination of Cyberterrorism

A Close Examination of Cyberterrorism

Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about situations that arise where individuals or groups commit overtly evil acts to deliberately intimidate people. Cyberterrorism is doing the same thing through coordinated attacks on computing networks. Today, we take a look at cyberterrorism and how it is different from other cybercrime.

FBI Definition
The accepted FBI definition of cyberterrorism was offered by now retired Special Agent Mark Pollitt. As a member of the Computer Analysis Response Team (CART), he was on the front lines when cyberthreats began to inundate networks, and defined cyberterrorism as “...the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.”

The difference between cyberterrorism, and what we typically refer to as cybercrime, is based firmly on intent. For this reason, cyberterrorism has the distinction separate from other cybercrime that it causes physical harm to a person or infrastructure to advance an attacker’s socio-political agenda.

How Attacks Are Carried Out
Think of all the ways that cybercriminals can infiltrate computer networks. Every one of those is open and available to cyber terrorists. They use the most familiar types of attacks, but they aim them at places where it will produce the most chaos. Instead of focusing on direct monetary gain, a cyber terrorist will direct his/her attention to a construct that, if broken, would cause mass panic like power or traffic grids.

Groups of cyber terrorists will disrupt, or sabotage websites and other Internet-based resources owned by organizations that are in active opposition to their views. They also often make coordinated attempts to tamper with military technology and, as mentioned before, public infrastructure, with the idea to terrorize the people on the other end of the system.

Since these black hat groups tend to use the same means as would your typical hacker, the strategies to stop them are very similar. Use the defenses you have available, whether they be hardware, software solutions, or behaviors designed to mitigate your exposure to these types of risks.

Tekie Geek’s security experts can help keep unwanted entities out of your network and keep your business running productively. For more information, contact us today at (347) 830-7322.

Technology Addiction is a Problem in Children and ...
This Week’s Tech Term: Blockchain


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Network Tactics Emergency Google Maps Tracking Managed IT email scam Government Cybercrime Uninterrupted Power Supply Piracy Remote Computing Proactive IT Specifications Vulnerability Maintenance Law Enforcement Motion Sickness Managed IT Services Smartphones IT support New York City Best Practices Computing Flash Holiday IT consulting NYC Domains Social Engineering Conferencing Cortana Malware ransomware attacks Screen Reader Vulnerabilities Social Media Thank You Managed Service Provider Outsourced IT Staffing Content Hard Drive malware Hard disk Wireless Headphones Hosted Solution Data Security eWaste Staten Island computer support end-user files computer services Staten Island Experience IT consulting Data computer repair Staten Island Tablet Mobile Device Management Upgrade communications Google Wallet Virtualization Desktop Software Privacy Cloud computing Staten Island CCTV staten island managed services Antivirus Staten Island IT support IT support Staten Islans Chromebook Hacks Google Docs Cloud Computing Virus Downtime Access Control Cache Network Security Internet of Things Business Computing Applications Mobile Security Social Network Browser Identity Theft Android Cost Management IT services Staten Island Apps Machine Learning Money Unified Threat Management Outlook Google Calendar Cleaning Bluetooth User Tips Supercomputer Vendor Mangement Office Laptops Administration Business Growth Web Server Productivity Cybersecurity Unified Communications Business Continuity Securty data recovery Management Compliance Excel The Internet of Things YouTube Startup Workstations Start Menu computer support VoIP Tip of the Week Internet Windows XP Virtual Assistant Upload Telephony Alert IT support Staten Island End of Support Taxes Encryption Cabling computer support Staten Island Efficiency Backup History 3D Printing SaaS Communication News Text Messaging IT consulting Staten Island Business Management Microsoft Office Documents Samsung Running Cable Document Management Hardware Computer Rental Service Visible Light Communication Freedom of Information CrashOverride Lenovo Disaster Recovery Digital Payment Data Protection Computer Care Equifax Firewall Hard Drive Disposal Lithium-ion battery Administrator Writing G Suite VPN managed IT services NYC Saving Money IT consulting firms Computer Malfunction Telephone Systems malware worms Scalability Hardware Solutions Displays managed it services Tech Support IT services NYC Big Data Automation Wireless Information Technology Security Hackers Worker VoIP Windows Network Congestion Knowledge Computing Infrastructure Printer Cloud Touchscreen computer services Bitcoin Business Metrics Paperless Office data loss Processors Advertising Productivity Workplace Tips Username Spam Microsoft Excel Recovery Remote Monitoring Backup and Disaster Recovery Update Redundancy HTML it support Monitoring Distributed Denial of Service Regulation Robot Meetings IT Services Smartphone Sports Network Management Company Culture IT Management Patch Management Staten Island tech support Social IBM BYOD Small Business Analytics Passwords Virtual Reality IT support Black Market Mobile Technology datto Server Addiction Gadgets Time Management Hosted Solutions Hack IT consulting company Artificial Intelligence Settings Audit Wi-Fi Staten Island IT consulting Office Tips Politics Websites Mobility IT support NYC CryptoLocker managed IT services staten island Hiring/Firing Managing Stress Google Drive Hacking Workers Trends Flexibility Regulations IT consulting firm Tech Terms tech support Staten Island Corporate Profile IT Support Language How To Help Desk managed services Staten Island Deep Learning LiFi Software as a Service Legal WiFi Gamification Database Emails Gmail PDF DDoS Phishing SharePoint Bring Your Own Device Two-factor Authentication Access Monitors Congratulations Error Mobile Devices Streaming Media computer repair Windows 8 Data Breach Virtual Desktop Business Cards Device security Best Practice Downloads Drones Accountants Unified Threat Management Business Technology Managed Service Television Scam Public Cloud Download File Sharing Memory Mouse Managed IT Services Augmented Reality Business Computers Facebook Multi-factor Authentication Society data recovery Staten Island Laptop Data storage Apple Vendor Management Travel Printing Physical Security Multi-Factor Security Bandwidth Microsoft Disaster Hacker Cryptocurrency Business Mangement Safety Private Cloud Retail Employer Employee Relationship IT consulting Staten island Technology Solid State Drive Twitter today ’s organizations IT support firms Training computer support firms Office 365 Search Fake News BDR Digital Software License Password Information Blockchain Service Level Agreement Microchip Website Miscellaneous Employer-Employee Relationship Devices Nanotechnology Windows 10 Education Content Filtering In Internet of Things IT services New York City Accidental deletion Going Green Wireless Technology App Banking Relocation managed services Quick Tips Mobile Device Health tech support Automobile Operating System computer support NYC Botnet Data Management tech support Staten Isalnd Email Google Windows 10 Notifications Tablets Webcam Networking Customer Service Legislation Spyware Innovation Tech Term Data Backup Comparison Telephone Project Management Budget Tip of the week IT Consultant Ransomware Collaboration Powerful Technology Solutions Save Money Word Music Work/Life Balance Reliable Computing Customer Resource management

Newsletter Sign Up