How would you be affected if every file on your computer was corrupt,
inaccessible or deleted? If a virus gets on your network, in a blink of an eye your network or portion of the network would be shut down, losing countless
personnel hours and adversely affecting mission effectiveness.
This is why there is a notification to update passwords every 60, 90 and 120 days or as the organization or system requires. These protective measures are
utilized to protect against cyberterrorism.
There have been several stumbling blocks to create a clear and consistent definition of the term “cyberterrorism.” There is an entire arsenal of words used to describe what some military and political strategists describe as the “new terrorism” of our times – cybercrime, infowar, netwar, cyberterrorism, cyberharassment, virtual warfare, digital terrorism, cybertactics, computer warfare, cyberattack and cyber-break-ins.
Fortunately, some efforts have been made to define cyberterrorism. Most
notably, Dorothy Denning, a professor of computer science, has put forward an
admirably unambiguous definition in numerous articles and in her testimony on the subject before the House Armed Services Committee in May 2000: Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
Further, to qualify as cyber-terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyber-terrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not.
This is why it is imperative for us as military members, civilians and dependents to ensure we update our passwords every 60, 90, 120 days or as the organization or system requires. Treat your password with the utmost importance; it is the frontline to cyberterrorism. To report suspicious activities, notify your unit client support administrator. Cyberterrorism doesn’t just affect you, but the mission as a whole.
(Courtesy of the 435th Air Base Wing Installation Antiterrorism Office)