Estonia after the 2007 Cyber Attacks

2011 ◽  
Vol 1 (1) ◽  
pp. 24-34 ◽  
Author(s):  
Christian Czosseck ◽  
Rain Ottis ◽  
Anna-Maria Talihärm

At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe regarding the ubiquitous use of information and communication technology (ICT) in all aspects of society. Relaying on the Internet for conducting a range of business transactions is common practice. But naturally, the more a society depends on ICT, the more it becomes vulnerable to cyber attacks. Unlike other research on the Estonian incident, this paper does not focus on the analysis of the events themselves. Instead, the authors examine Estonia’s cyber security policy and subsequent changes made in response to the cyber attacks. As such, the authors provide a comprehensive overview of the strategic, legal, and organisational changes based on lessons learned by Estonia after the 2007 cyber attacks. The analysis is based on a review of national security governing strategies, changes in the Estonia’s legal framework, and organisations with direct impact on cyber security. The paper discusses six important lessons learned and manifested in actual changes: each followed by a set of cyber security policy recommendations appealing to national security analysts as well as nation states developing their own cyber security strategy.

Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


2018 ◽  
pp. 1208-1221
Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2021 ◽  
pp. 84-94
Author(s):  
Mohammed. I. Alghamdi ◽  

The cyber security risks on Intellectual Property (IP) have unfortunately become the center of media attention quite recently. The cyber domain has risen to the front position of national security policy in the United States. This growth has created room for developing a lot of innovative technologies to prevent IP cyber-attacks. Usually, cyber-attacks target private data. But cyber-attacks have recently expanded their threat level to intellectual property. These threats affect companies, people, and even national security. Cyber threats to IP will be victimized by globalization. Hence, this article is aimed to explore existing innovative technologies used to prevent IP cyber-attacks and their future scope. To find out the existing technologies used in the prevention of cyber-attacks, secondary data will be used from recent reports by various public and government organizations, research papers, and news portals, and other relevant sources. Since cyber threats are increasing, a comprehensive, multinational strategy is needed for making better cyber security infrastructure. This strategy would improve international relations, protect international supply chains, innovation, and reduce financial losses.


2016 ◽  
pp. 100-128
Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


2019 ◽  
Author(s):  
◽  
Kristofas Barakat

The growing danger of cyber-threats has forced many states to develop and strengthen their cyber-security capabilities. The complex nature of cyber-threats has a profound impact on traditional international relations, as many states today consider cyberspace as the greatest challenge to their national security. Research literature on cyberspace and cyber-threats is particularly limited in the case of Lebanon, despite Lebanon’s interesting cyber-threats history. The domination of traditional security dilemmas have restricted Lebanon from developing a successful cyber-security. The lack of attention and development for cyber-security has made Lebanon an appealing target for various actors to conduct their cyber-operations. The objective of the thesis is to determine whether Lebanon has the ability to defend itself from cyber-threats in spite of a missing cyber-security policy. The thesis offers an analysis of Lebanon’s current conditions with regard to cyber-security at various levels. The thesis employs the international legal framework on cybercrime, the Budapest Convention, in order to assess Lebanon’s capabilities to counter cyber-threats. Furthermore, this study utilizes Estonia, a small Baltic nation considered as one of the leaders in the field, as a comparative case to further examine Lebanon’s cyber-security and identify areas that would bolster Lebanon’s capabilities.


Author(s):  
Sir Richard Dearlove

This article discusses the changing perceptions on national security and civic anxiety. During the Cold War and its aftermath, security was rather a simple and straightforward issue. The countries knew their enemies, where they are and the threats they presented. On the event that, the enemies's secrets were unknown, probing techniques were employed to determine the weaknesses of the enemy. This formulaic situation which seeped through in to the twenty-first century left little room for innovation. In fact, in some countries, security maintained at the Cold War levels despite criticisms that new and emerging national security threats should be addressed at a new level. Of the powerful nations, America maintained the role of a world policeman and adapted its national security priorities according to its perception of a new series of strategic threats; however these new security strategies were without a sense of urgency. However, the perception of global threats and national security radically changed in the event of the 9/11 attack. The sleeping national security priorities of America came to a full force which affected the national security priorities of other nations as well. In the twenty-first globalized world, no conflict remains a regional clash. The reverberations of the Russian military action in Georgia, the Israeli intervention in Gaza, and the results of the attacks in Mumbai resonates loudly and rapidly through the wider international security system. While today, nations continue to seek new methods for addressing new security threats, the paradox of the national security policy is that nation-states have lost their exclusive grip of their own security at a time when the private citizens are assailed by increased fears for their own security and demand a more enhanced safety from the state. Nation-states have been much safer from large-scale violence, however there exists a strong sense of anxiety about the lack of security in the face of multiplicity of threats. Nations have been largely dependent on international coordinated action to achieve their important national security objectives. National policies and security theory lack precision. In addition, the internationalization of national security has eroded the distinction between domestic and foreign security. These blurring lines suggest that the understanding of national security is still at the height of transformations.


Author(s):  
Christopher J. Fuller

This concluding chapter examines the legacy of the CIA's drone war on U.S. counterterrorism, wider U.S. national security policy, and the conduct of America's rivals—both nation-states and terrorist groups. It contemplates the nature of technological progress, judging that innovations always introduce potential threats and opportunities in equal measure. Furthermore, while it is almost inevitable that terrorist groups will exploit drone technology for heinous ends, the technology also offers wider commercial and civilian society opportunities, just as previous transformative technologies, first developed for the purpose of taking lives, eventually came to transform them in positive ways. The use of drones to neutralize terrorists is best understood as the embodiment of America's long-term counterterrorism goal made possible by advancements in both technology and the willingness of the U.S. government to authorize the CIA in undertaking lethal counterterrorist actions.


2018 ◽  
Author(s):  
Peter M. Shane

This critique of Karson K. Thompson’s note, "Not Like an Egyptian: Cybersecurity and the Internet Kill Switch Debate," argues that the U.S. lacks a framework of laws and regulations, "smart" or otherwise, that adequately incentivizes the parties with the greatest capacity to improve our cyber security to do so. It attributes the poor state of U.S. cyber policy to the "bewildering array of overlapping responsibilities" scattered among government offices and departments; the difficult imperative of sharing responsibility among military and civilian authorities; the fact that most of the networks (and the dependent critical infrastructures) that need protecting are in private hands; and the lack of public understanding of the kinds of regulation that are necessary or appropriate. The essay argues that meaningful progress towards an adequate legal framework depends on a broad national debate aimed at defining the public good with regard to cyber-security, and the inevitable trade-offs among security, privacy, productivity, economic growth, organizational flexibility, military effectiveness, government transparency, and accountability that must be confronted in making sensible cyber-security policy.


Author(s):  
Maurice Dawson ◽  
Jorja Wright ◽  
Marwan Omar

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.


Sign in / Sign up

Export Citation Format

Share Document