Critical thinking assignment about Estonia 2007 cyber attacks

User Generated

njox99

Computer Science

Description

Read the following case study (file below).

Czosseck, C., Ottis, R., & Talihä, A. (2011, July). Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security. European Conference on Information Warfare and Security, 57-IX.

Answer and wright the following questions:

  • Introduction about Estonia 2007 cyber attacks
  • What strategic recommendations would you make?
  • What operational security aspects should be considered so as to prevent such attacks in the future?
  • What sort of an encryption policy, if any, would have helped in this situation?
  • Conclusion
  • References

Directions:

  • Your paper should be 3-5 pages in length, not including the title or reference pages.
  • Be sure to provide citations from your readings and additional research to support your statements.
  • Your paper must follow academic writing standards and APA style guidelines, as appropriate.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Estonia After the 2007 Cyber Attacks

Estonia After the 2007 Cyber Attacks
Student’s Name
Course
Date
Professor’s Name

Estonia After the 2007 Cyber Attacks

Introduction to Estonia 2007 cyber attacks

Estonia’s computer attack alarmingly knocked out various websites in 2007. It has crippled down
lots of government as well as corporate sites in Estonia which is known as among the most wired
nation in Europe. Authorities of Estonia was able to trace these attacks in their computer networks to
Russia and discovered allegedly orchestrated by Kremlin which, a charge which has been denied by
Moscow. On the 27th of April 2007, protesters from the Russian government staged violent protests
and attacked many of the Estonian minorities that have been sparked by the decision of Estonia of
moving the Soviet’s memorial of World War II from Tallinn to a cemetery for members of the military
in the suburb in Russia. According to the article (Associated Press, 2009), the coordinated cyberattack against various government agencies as well as banks were performed using hundreds of
thousands of computers. The attack on the computer systems in Estonia was not categorized as an
armed attack by its government that refrains them from requesting a support from NATO. However,
the Estonia government regarded this act as a cyber-crime committed by an individual and this has
motivated a call to the European Union to make this frightening and harmful act in the IT system as a
criminal offense.

Strategic recommendations

In the report of Tamkin (2017), it has been reported that the cyber threat became far worse 10
years after the cyber-attack in Estonia. There have been numerous cyber-attacks incidents
happened such as the hacking of Russia to the IT system of Georgia as punishment for openly
dealing with the west, the NASDAQ hacking in 2010, planting of malware on the infrastructure of
U.S. in 2011, in 2014, targeted Ukraine by attacking the phones of the lawmakers through the use of
an equipment in Crimea, hacking of the Ministry of Denmark by Russia in 2015-2016, and hacking
the media outlet in France and German Bundestag. The Russian hacking activities also scared Paris
as well as Berlin because of the possibility of causing havoc in their elections where an indication of

Estonia After the 2007 Cyber Attacks

it has already shown in breaking to the DNC where disseminating and unveiling content helped in
distorting the media coverage of a certain candidate (Tamkin, 2017). The unleashing of the Stuxnet
virus by U.S.-Israel joined forces that slowed down Iran’s nuclear program in 2007 which was only
discovered in the year 2010 (Tamkin, 2017). And the most recent is the in October of 2017 the
internet was under attack where special malware was used in infecting the internet devices. These
numerous attacks on the IT system have become a global wake-up call and a threat to the security
of the international community that needs to be addressed to curb further damages by developing
cybersecurity effective strategies.

As an effort and responding to the thr...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags