What is Cyber Terrorism?
Cyber terrorism is a politically-motivated attack against computers and data. These attacks are intended to be disruptive and advance the attackers’ political or religious stance. Acts of cyber terrorism result in a total or partial interruption of a computer system. Unlike cyber extortion, the hacker isn’t asking for any sort of ransom in cyber terrorism situations.
Examples of Cyber Terrorism
- Sophisticated network attacks to gain access to sensitive data and high-value business information
- Viruses and worms that are maliciously designed to disrupt, damage and attack an electronic infrastructure
- Hacks to collect personally-identifiable information which can be used to steal identities
Electronic data is an important component of your business operations. What would happen if you suddenly lost access to this information? Would you be prepared for the cost associated with recovering your computer network assets? (more…)
When it comes to data security, a threat is any potential danger to information or systems. Threats could be an intruder network through a port on the firewall, a process accessing data in a way that violates the security policy, a tornado wiping out a facility, or an employee making an unintentional mistake that could expose confidential information or destroy a file’s integrity.
It’s critical for every business to understand their risk. An important step in data security is to identify potential threats, classify them by category, and evaluate the damage potential to the company. Use this checklist to understand common data threats and assess how they may affect your business: (more…)