Cyber Terrorist Classifications: After reading a few different articles on cyber terrorism I have defined three different types. There are those who start virus and normally this is just because they are looking for some type of challenge and like to create chaos. Then there are those who purposefully attack individuals and I refer to those as common cyber criminal activity. These hackers are either looking to make money or show out their newly acquired skills. Finally there are hackers who purposely and professionally attack corporations and government organizations. This is normally done for money or a newly coined term called hacktivism. Hacktivism is when a hacker attacks a specific target trying to justify criminal activity for a certain cause. Hackers today are trying to win over more and more followers. Some have even said they are being to recruit great scientific mind right out of college. When an actual hackivism attach occurs it often has several hackers who are involved in the process.
Many people today think that companies as well as governments do not have adequate resources to defend against hackers. Often companies take a more reactive stance than a proactive stance. One issue the US government is trying to do is educate those companies and individuals on cyber terrorism. One article stated the following great measures you can take to defend against cyber terrorism.
- Have a plan – If you’re attacked have steps you can take or a business continuity plan.
- Back up information – Have some type of system that backups your system critical data this way if you’re attacked your company can quickly resume their processes.
- Authenticate Network Users – Everyone should have their own account and have a badge which is not impossible for a hacker to get by but it acts as a simply deterrent.
- Reporting Problems in the Workplace – An IT team should be trained to find issues within the system and act upon employees concerns.
- Reducing Vulnerability – Whether it be benchmarking, consulting or even hiring a hacker it is important for these to be identified before a real hacker attacks the system.
- Everyone should know what to do – In the event of an attack employees should know what to do and who to go to.
No comments:
Post a Comment