Cyberterrorism
is any premeditated, politically motivated attack against information systems,
programs and data that results in violence.
The
details of cyberterrorism and the parties involved are viewed differently by
various organizations. The U.S. Federal Bureau of Investigation (FBI) defines
cyberterrorism as any "premeditated, politically motivated attack against
information, computer systems, computer programs and data which results in
violence against noncombatant targets by subnational groups or clandestine
agents."
Unlike
a nuisance virus or computer attack that results in a denial of
service (DoS), the FBI distinguishes a cyberterrorist attack as a type of cybercrime explicitly
designed to cause physical harm. However, there is no current consensus between
various governments and the information security community on what qualifies as
an act of cyberterrorism.
Other
organizations and experts suggest that less harmful attacks can also be
considered to be acts of cyberterrorism, as long as the attacks are intended to
be disruptive or to further the attackers' political stance. In some cases, the
differentiation between cyberterrorism attacks and more ordinary cybercrime
activity lies in the intention: The primary motivation for cyberterrorism
attacks is to disrupt or harm the victims, even if the attacks do not result in
physical harm or cause extreme financial harm.
In
other cases, the differentiation is tied to the outcome of a cyber-attack; many
cybersecurity experts believe an incident should be considered cyberterrorism
if it results in physical harm or loss of life, either directly or indirectly
through damage or disruption to critical infrastructure. However, others
believe physical harm is not a prerequisite for classifying a cyber-attack as a
terrorist event. The North Atlantic Treaty Organization, for example, has
defined cyberterrorism as "a cyber-attack using or exploiting computer or
communication networks to cause sufficient destruction or disruption to
generate fear or to intimidate a society into an ideological goal."
According
to the U.S. Commission on Critical Infrastructure Protection, possible
cyberterrorist targets include the banking industry, military installations,
power plants, air traffic control centers and water systems.
Methods used for cyberterrorism
The
intention of cyberterrorist groups is to cause mass chaos, disrupt critical
infrastructure, support political activism or hacktivism, and inflict
physical damage or even loss of life. Cyberterrorism actors use a variety of
attack methods. These include but are not limited to the following:
- Advanced persistent threat (APT) attacks use sophisticated and concentrated penetration methods to gain network access and stay there undetected for a period of time with the intention of stealing data. Typical targets for APT attacks are organizations with high-value information, such as national defense, manufacturing and the financial industry.
- Computer viruses, worms and malware target information technology (IT) control systems and can affect utilities, transportation systems, power grids, critical infrastructure and military systems, creating instability.
- DoS attacks are intended to prevent legitimate users from accessing targeted computer systems, devices or other computer network resources and can be aimed at critical infrastructure and governments.
- Hacking, or gaining unauthorized access, seeks to steal critical data from institutions, governments and businesses.
- Ransomware, a type of malware, holds data or information systems hostage until the victim pays the ransom.
- Phishing attacks attempt to collect information through a target's email, using that information to access systems or steal the victim's identity.
Defending against cyberterrorism
The key to countering the threat of cyberterrorism
is to implement extensive cybersecurity measures and vigilance.
On the corporate level, businesses must ensure
that all internets of things devices are properly secured and inaccessible via
public networks. To protect against ransomware and similar types of attacks,
organizations must regularly backup systems; utilize firewalls, antivirus
software and antimalware; and implement continuous monitoring
techniques.
Companies must also develop IT security
policies to protect business data. This includes limiting access to
sensitive data and enforcing strict password and authentication procedures,
like two-factor authentication or multifactor authentication.
Comments
Post a Comment