IA1 – EVALUATION OF THE GLOBAL IMPACT OF THE ESTONIA CYBER EVENT
Sherquita Tucker
CSEC655 Section 9041
Table of Contents 1. Introduction 3 2. Background and Global Impact 4 3. Vulnerabilities in Cybersecurity Policy and Practices 5 4. Advantages of Reducing Vulnerabilities for Future Attacks 8 5. Disadvantages of Reducing Vulnerabilities for Future Attacks 8 6. Advantages of Improving Security Practices or Policies 9 7. Disadvantages of Improving Security Practices or Policies 10 8. Summary and Conclusion 12 References 14
IA1 – Evaluation of the Global Impact of the Estonia Cyber Event
1. Introduction
What if suddenly the safety systems of nuclear power plants unexpectedly malfunctioned, or
…show more content…
In fact, the threat of an attack has grown significantly throughout cyberspace to where cyberspace has emerged as an arena for war similar to that of land, sea, air and space, with the emergent possibility to harm the national security of nation-states, as exemplified by the 2007 cyber warfare that plagued Estonia.
Nearly a decade since the introduction of the Internet, the transnational community still does not have an organized, authoritative group of standards to oversee the actions of nations in cyberspace. To deter aggression in cyberspace it is necessary to have such standards established.
This paper examines the cyber-attacks of the nation Estonia and how the lack of global standards was a critical part of the attack. In addition, this paper looks at the vulnerabilities in the cyber security policies and practices instituted at the occurrence of the cyber-attacks on Estonia as well as the advantages and disadvantages for improving and reducing each named vulnerability and security practice.
2. Background and Global Impact
From the time Estonia affirmed its independence from the Soviet Union in 1991, it has enthusiastically incorporated ICT in the everyday life of its citizens, therefore becoming one of the most digitally connected nations in Europe. To further illustrate, over 65 percent of Estonians are Internet consumers where they execute practically every administrative operation of society online (Finn,
The conditional fee arrangement was introduced by the Access to Justice Act (AJA) 1999, as an attempt to transfer legal funding from the treasury to the private sector. This occurred as a result of an increasing and ridiculous growth in the cost of legal aid, namely from a few hundred million to well over 2.1 billion pounds from the 1980s to 2000. Moreover, it was not because demand was growing. Rather, number of cases relying on legal aid had decreased. Due to the need to control budget, Conditional fee arrangements are used to fund many civil cases which legal aid now excludes, and the issues brought about by conditional fee arrangements have been debated over the last decade. The conditional fee arrangements are sometime known as ‘no
With cyber war, nations are able to skip the battlefield. Gone are the days where troops line up across from each other hoping to do damage to the other. Clarke explains that people, industries, governments, companies and organizations can be possible targets and are vulnerable to these attacks. Keeping that in mind should help these targets become defensive minded and shield off attacks before they happen. As we all know, the prevention is better than the
Picture living in a community where every minute of every day you were hungry, under-clothed, and afraid death because you are poor. A world in which child dies of hunger every 5 seconds. Now imagine waking up and your biggest problem was which sweater to wear with which jeans. Even though this seems hard to imagine, this life of poverty has been a reality for most people for ages. Before the1900s, few wealthy people would ever think about poverty. Two prominent authors were Garrett Hardin and Peter Singer, who wrote essays about human poverty. They questioned whether to confront the issue of poverty or to ignore it. The first essay is "Life Ethics: the Case Against Helping the Poor" from the
The article “Defending America in Cyberspace” in the journal The National Interest authored by Keith Alexander, Emily Goldman, and Michael Warner taught me much about how the Department of Homeland Security handles America’s cyber threats. The Department of Security is the lead agency in protecting America from domestic cybersecurity incidents. It stated how America fights Cyber crime and security threats. In this day and age, countries are very vulnerable to skilled hackers. Some of them not even under the age 18.
In “Cyber war is Already Upon Us” by John Arquilla. Arquilla argues that “cyber war has arrived” and there needs to be focus on what can be done to control it (Arquilla 4). Arquilla provides examples of cyber attacks that he considers to be instances of cyber war to argue his point. To be considered an act of war, an attack must be potentially violent, purposeful, and political (Lecture 20. Slide 5). Many of the attacks that Arquilla refers to were purposeful and political, making them comparable to specific battles within a war. However, they should not be classified as entire wars by themselves because traditionally war is defined as a period of ongoing conflict and not one specific attack. While cyber war is a possibility, nothing in
The JIE considers that the future security environment will continue to feature a range of adversaries attempting to shape political behavior by conducting damaging or disruptive cyber-attacks. This is a consequence of the globalization and cannot be stopped, however timely contention is needed. The Joint Force must minimize the consequences of threatened or successful cyberattacks against the United States, its allies, and partners by conducting Military Support to Cyber
Cyber security is a major concern for every department, business, and citizen of the United States because technology impacts every aspect of our daily lives. The more we use technology the more complacent, we get with the information that is stored within our cyber networks. The more complacent, we get, the more vulnerable we become to cyber-attacks because we fail to update the mechanisms that safeguard our information. Breaches to security networks are detrimental to personal, economic, and national security information. Many countries, like Russia, China, Israel, France, and the United Kingdom, now have the abilities and technology to launch cyber-attacks on the United States. In the last five years there have been several attacks on cyber systems to gain access to information maintained by major businesses and the United States Government. Cyber-attacks cause serious harm to the United States’ economy, community, and the safety, so we need to build stronger cyber security mechanisms. Based on my theoretical analysis, I recommend the following:
When considering the technological advances over the past 50 years, the Internet has undoubtedly had the greatest impact on everyday life of developed economies and its citizens. The world has become smaller, societies interconnected, and the pace of global integration dramatically increased since the introduction of the Internet. As people and information become increasingly integrated around the world, physical borders between nations are no longer sufficient to restrict access to information and sensitive data. This integrated world allows for malicious cyber actors to advance strategic
Clarke and Knake use a mixed method research approach in Cyber War to support their hypothesis that offensive prowess is meaningless without solid defense in cyberspace, and that the United States need immediately fix our defensive cyber shortfalls, or face apocalyptic doom. Specifically, the authors define ‘cyber war’ as “actions by a nation state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.” This infers that they are really talking about ‘warfare’ and
The United States houses more than 15 critical infrastructures, all of which implement information and communication technologies (ICT) systems, making the risk of a cyberwar a constant possibility. In order to
Cyber threats and attacks are becoming more common, sophisticated and damaging. NATO and its Allies rely on strong and resilient cyber defenses to fulfil the Alliance’s core tasks of collective defense, crisis management and cooperative security. NATO affirms international law applies in cyberspace
Wars have been occurring since the beginning of time. Wars were once fought with sticks but as humans evolved, so did the weapons involved. Today’s warfare includes anything from hand grenades to remote controlled planes that are thousands of miles away from the operator. The rise of technology has become an issue due to the increasing development of these devices. Technology is used worldwide and as wars continue to develop, so does the possibility that the next war could rise into a cyber war. The Cybersecurity Enhancement Act will ensure the United States takes on these new threats with cybercrime by protecting the country’s critical infrastructures and ensuring the people are ready for the future in the cyberworld.
Most nations today fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks.
Over the past few years, hackers have made numerous shadowy attacks to remain undetected throughout companies crippled security in effort for them to build a stronger protection platform. In 2013, hackers breached and disabled multiple sections of the electric grid in the United States. This mayhem unleashed was simulated but it warned the government to take action on the growing threats of cyberattacks and they did so. Bryn Nelson (2014) confirms a problem as he uses experts like president Obama who stated that cyberattacks were called one of the most serious economic and national security challenges that the United States faces in today’s world (p. 517). If different web platforms don’t take action, then it would be very catastrophic for
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States