Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security

نویسندگان

  • Christian Czosseck
  • Rain Ottis
  • Anna-Maria Talihärm
چکیده

At the time of the state-wide cyber attacks in 2007, Estonia was one of the most developed nations in Europe regarding the ubiquitous use of information and communication technology (ICT) in all aspects of the society. Relaying on the Internet for conducting a wide range of business transactions was and still is common practice. Some of the relevant indicators include: 99% of all banking done via electronic means, over a hundred public eservices available and the first online parliamentary elections in the world. But naturally, the more a society depends on ICT, the more it becomes vulnerable to cyber attacks. Unlike other research on the Estonian incident, this case study shall not focus on the analysis of the events themselves. Instead it looks at Estonia's cyber security policy and subsequent changes made in response to the cyber attacks hitting Estonia in 2007. As such, the paper provides a comprehensive overview of the strategic, legal and organisational changes based on lessons learned by Estonia after the 2007 cyber attacks. The analysis provided herein is based on a review of national security governing strategies, changes in the Estonia’s legal framework and organisations with direct impact on cyber security. The paper discusses six important lessons learned and manifested in actual changes: each followed by a set of cyber security policy recommendations appealing to national security analysts as well as nation states developing their own cyber security strategy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyberattacks: Does Physical Boundry Matter?

Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 c...

متن کامل

Cyber warfare " , the truth in a real case

Attacks against IT systems are common and attackers are often making headlines by compromising secure and critical systems to carry out malicious activities. These attacks aggravate during political conflicts and hackers get involved in destroying each other’s IT infrastructure ultimately leading to a cyber war. History has witnessed many cyber wars and the cyber attack against Estonia in April...

متن کامل

A Review on Cyberspace Security: Lessons for Islamic Republic of Iran

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

متن کامل

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber acti...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJCWT

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2011