{"id":2000,"date":"2003-10-28T00:00:00","date_gmt":"2003-10-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/28\/putting-cyberterrorism-into-context\/"},"modified":"2021-12-30T11:40:26","modified_gmt":"2021-12-30T11:40:26","slug":"putting-cyberterrorism-into-context","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/28\/putting-cyberterrorism-into-context\/","title":{"rendered":"Putting cyberterrorism into context"},"content":{"rendered":"<p>For sometime now (even dating back to the Gulf War in 1991) there has been a heightened level of interest in the potential threat of cyberterrorism coupled with an unhelpful amount of hype and misinformation surrounding the use of the term.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part of the problem is one of definition &#8211; there are broadly different definitions as to what actually constitutes &#8216;cyberterrorism&#8217;.  There are a number of well-accepted definitions which share common similarities and are outlined below.<br \/>\nBut increasingly, there are a number of loose definitions which are promulgated to encourage the purchase of particular computer security products or services or to generate interest in a story by the media. The purpose of this article is to present a legitimate definition of &#8216;cyberterrorism&#8217; and identify some common misuses of the term.<br \/>\nIf organizations are taking steps to protect themselves from ordinary cyber attacks of the type that are reported in the media and the 2003 Australian Computer Crime and Security Survey, then they will be well placed to protecting against all forms of cyber attack. Organizations and businesses should therefore ensure they focus on managing all threats &#8211; deliberate, accidental or natural &#8211; logical or physical &#8211; and implement appropriate security measures to manage that risk.<br \/>\nMore info: [url=http:\/\/www.auscert.org.au\/render.html?it=3552]http:\/\/www.auscert.org.au\/render.html?it=3552[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2000","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2000"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2000\/revisions"}],"predecessor-version":[{"id":4487,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2000\/revisions\/4487"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}