CRITICAL THINKING - Estonia Case Study - 2 Pages, APA

User Generated

Fhygna241

Writing

Description

Estonia Case Study

Read the following case study (linked below and also available through ProQuest in the library).

Czosseck, C., Ottis, R., & Talihä, A. (2011, July). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. European Conference on Information Warfare and Security, 57-IX.

Link : https://www-igi-global-com.sdl.idm.oclc.org/gateway/article/61328

Answer the following questions:

  1. What strategic recommendations would you make?
  2. What operational security aspects should be considered so as to prevent such attacks in the future?
  3. What sort of an encryption policy, if any, would have helped in this situation?

Directions:

  • Your paper should be 2 pages in length, not including the title or reference pages.
  • Be sure to provide citations from your readings and additional research to support your statements.
  • Your paper must follow The University academic writing standards and APA style guidelines, as appropriate.
  • You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide. Below 20%

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.
Attached.

Running head: ESTONIA CYBER ATTACK

1

Estonia Cyber Attack
Name
Institution

ESTONIA CYBER ATTACK

2
Estonia Cyber Attack

1.What strategic recommendations would you make?
The first strategic recommendations needed is to ensure that all computers have a reliable
anti-virus and firewalls software because such will detect malware before it harms the data and
prevents any transfer to other networks through emails. Secondly, all computers sold should have
firewalls and antivirus. Most people don’t understand what cyber-attack is and how to prevent it
(Czosseck, Ottis & Talihä 2011). Therefore, it’s recommendable that such information is
distributed freely by the dealers or manufacturers of all computers including smartphones.
Thirdly, the government should put strict laws regarding cybercrime and stun measures taken
against anyone caught. Companies and government sectors, as well as schools, should make it
mandatory to teach on cyber-attack and its prevention so that everyone becomes knowledgeable
on matters regarding cybersecurity. The law enforcers should be involved to ensure that they
monitor the information transferred through the internet and arrest those transferring suspicious
information (Czosseck, Ottis & Talihä 2011). Lastly, it’s recommendable that law enforcers give
phone number where an anonymous person can report any questionable information to the
security enforcers.
2.

What operational security aspects should be considered to prevent such attacks in the
future?
Until after the 2007 cyber-attack, the implementation of information technology did not

involve the law enforcers, military or any police department (Czosseck, Ottis & Talihä 2011).
There were no rules that prevented and enabled persecution of the cybercriminals in Estonia. The
2007 Estonia cyber-attack was t...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags