메뉴 건너뛰기




Volumn , Issue , 2011, Pages 57-64

Estonia after the 2007 cyber attacks: Legal, strategic and organisational changes in cyber security

Author keywords

Cyber attacks; Estonia; Legal framework; Lessons learned; Organisational changes; Strategy

Indexed keywords

CYBER-ATTACKS; ESTONIA; LEGAL FRAMEWORKS; LESSONS LEARNED; ORGANISATIONAL CHANGE; STRATEGY;

EID: 84872945708     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (42)
  • 2
    • 33645134706 scopus 로고    scopus 로고
    • A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
    • Brown, D. (2006) "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict", Harvard International Law Journal, 47 (1), 179-221.
    • (2006) Harvard International Law Journal , vol.47 , Issue.1 , pp. 179-221
    • Brown, D.1
  • 3
    • 84872910476 scopus 로고    scopus 로고
    • CDL. (n.d.) Retrieved from
    • CDL. (n.d.). Cyber Defence League. Retrieved from http://www.kaitseliit. ee/index.php?op=body&cat-id=395.
    • Cyber Defence League
  • 4
    • 84872956054 scopus 로고    scopus 로고
    • Retrieved from
    • Council of Europe. (2001). Convention on Cybercrime. Retrieved from http://conventions.coe.int/treaty/en/treaties/html/185.htm.
    • (2001) Convention on Cybercrime
  • 5
    • 84872967674 scopus 로고    scopus 로고
    • Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems
    • Council of Europe
    • Council of Europe. (2005). Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems. Official Journal L 69, 67-71.
    • (2005) Official Journal , vol.L 69 , pp. 67-71
  • 6
    • 0242440508 scopus 로고    scopus 로고
    • Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy
    • Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239-288.
    • (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy , pp. 239-288
    • Denning, D.E.1
  • 8
    • 84872938561 scopus 로고    scopus 로고
    • Retrieved January 31, 2011, from
    • ENISA. (2010). EU Cyber Security Exercise 'Cyber Europe 2010'. Retrieved January 31, 2011, from http://www.enisa.europa.eu/media/press-releases/cyber- europe-20102019-cyber-security-exercise-with-320-2018incidents2019-successfully- concluded.
    • (2010) EU Cyber Security Exercise 'Cyber Europe 2010'
  • 10
    • 84872969017 scopus 로고    scopus 로고
    • Estonian Government. Retrieved from
    • Estonian Government. (2007b). Explanatory Memorandum to the Draft Act on the Amendment of the Penal Code (116 SE) (In Estonian). Retrieved from http://www.riigikogu.ee/?page=pub-file&op=emsplain&content-type= application/msword&u=20090902161440&file-id=198499&file-name=KarS seletuskiri(167).doc&file-sise=66048&mnsensk=166+SE&etapp=03.12. 2007&fd=29.10.2008.
    • (2007) Explanatory Memorandum to the Draft Act on the Amendment of the Penal Code (116 SE) (In Estonian)
  • 13
    • 63349101242 scopus 로고    scopus 로고
    • Battling botnets and online mobs: Estonia's defense efforts during the internet war
    • Evron, G. (2008). Battling botnets and online mobs: Estonia's defense efforts during the internet war. Georgetown Journal of International Affairs, 9(1), 121-126.
    • (2008) Georgetown Journal of International Affairs , vol.9 , Issue.1 , pp. 121-126
    • Evron, G.1
  • 14
    • 84865426661 scopus 로고    scopus 로고
    • A Brief Examination of Media Coverage of Cyberattacks (2007 - Present)
    • C. Czosseck & K. Geers (Eds.), IOS Press
    • Farivar, C. (2009). A Brief Examination of Media Coverage of Cyberattacks (2007 - Present). In C. Czosseck & K. Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber warfare (pp. 182-188). IOS Press.
    • (2009) The Virtual Battlefield: Perspectives on Cyber Warfare , pp. 182-188
    • Farivar, C.1
  • 18
    • 84872971904 scopus 로고    scopus 로고
    • Retrieved from
    • Kash, W. (2008). Lessons from the cyberattacks on Estonia. Retrieved from http://gcn.com/articles/2008/06/13/lauri-almann-lessons-from-the-cyberattacks- on-estonia.aspx.
    • (2008) Lessons from the Cyberattacks on Estonia
    • Kash, W.1
  • 20
    • 0039903416 scopus 로고    scopus 로고
    • In Estonia, what may be the first war in cyberspace
    • Retrieved from
    • Landler, M., & Markoff, J. (2007). In Estonia, what may be the first war in cyberspace. The New York Times. Retrieved from http://www.nytimes.com/ 2007/05/28/business/worldbusiness/28iht-cyberwar.4.5901141.html.
    • (2007) The New York Times
    • Landler, M.1    Markoff, J.2
  • 21
    • 84872952855 scopus 로고    scopus 로고
    • Pinprick attacks, a lesser included case?
    • C. Czosseck & K. Podins (Eds.), Tallinn: CCD COE Publications
    • Lemay, A., Fernandeza, J. M., & Knight, S. (2010). Pinprick attacks, a lesser included case? In C. Czosseck & K. Podins (Eds.), Conference on Cyber Conflict Proceedings (pp. 183-194). Tallinn: CCD COE Publications.
    • (2010) Conference on Cyber Conflict Proceedings , pp. 183-194
    • Lemay, A.1    Fernandeza, J.M.2    Knight, S.3
  • 22
    • 80051983932 scopus 로고    scopus 로고
    • Cyber Warfare: As a form of low-intensity conflict and insurgency
    • C. Czosseck & K. Podins (Eds.), Tallinn: CCD COE Publications
    • Liles, S. (2010). Cyber Warfare: As a form of low-intensity conflict and insurgency. In C. Czosseck & K. Podins (Eds.), Conference on Cyber Conflict Proceedings (pp. 47-57). Tallinn: CCD COE Publications.
    • (2010) Conference on Cyber Conflict Proceedings , pp. 47-57
    • Liles, S.1
  • 24
    • 79953896107 scopus 로고    scopus 로고
    • Retrieved from
    • MoD. (2008). Cyber Security Strategy. Retrieved from http://www.mod.gov. ee/files/kmin/img/files/Kuberjulgeoleku-strateegia-2008-2013-ENG.pdf.
    • (2008) Cyber Security Strategy
  • 25
    • 84872967319 scopus 로고    scopus 로고
    • MoD. Retrieved from
    • MoD. (2010). NATIONAL SECURITY CONCEPT. Retrieved from http://www.kmin.ee/files/kmin/nodes/9470-National-Security-Concept-of-Estonia. pdf.
    • (2010) National Security Concept
  • 26
    • 77954442435 scopus 로고    scopus 로고
    • MoEAC. Retrieved from
    • MoEAC. (2006). Estonian Information Society Strategy 2013. Retrieved from http://www.riso.ee/en/system/files/EstonianInformationSocietyStrategy2013.pdf.
    • (2006) Estonian Information Society Strategy 2013
  • 32
    • 84872945334 scopus 로고    scopus 로고
    • MoI. unofficial translation Retrieved January 4, 2011, from
    • MoI. (2009). Estonian Emergency Act (unofficial translation). Retrieved January 4, 2011, from http://www.legaltext.ee/et/andmebaas/tekst.asp?loc= text&dok=XXXXX26&keel=en&pg=1&ptyyp=RT&tyyp=X&query= h□daolukorra.
    • (2009) Estonian Emergency Act
  • 35
    • 84872898667 scopus 로고    scopus 로고
    • MoJ. unofficial translation Retrieved from
    • MoJ. (2010b). Estonian Code of Criminal Procedure (unofficial translation). Retrieved from http://www.legaltext.ee/text/en/X60027K6.htm.
    • (2010) Estonian Code of Criminal Procedure
  • 38
    • 84865438649 scopus 로고    scopus 로고
    • Politically Motivated Denial of Service Attacks
    • C. Czosseck & K. Geers (Eds.), 163-181: IOS Press
    • Nazario, J. (2009). Politically Motivated Denial of Service Attacks. In C. Czosseck & K. Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber Warfare (pp. 163-181). 163-181: IOS Press.
    • (2009) The Virtual Battlefield: Perspectives on Cyber Warfare , pp. 163-181
    • Nazario, J.1
  • 40
    • 84873187125 scopus 로고    scopus 로고
    • Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective
    • Academic Conferences Limited
    • Ottis, R. (2008). Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective. Proceedings of the 7th European Conference on Information Warfare (p. 163). Academic Conferences Limited.
    • (2008) Proceedings of the 7th European Conference on Information Warfare , pp. 163
    • Ottis, R.1
  • 41
    • 84873170803 scopus 로고    scopus 로고
    • Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability
    • Academic Publishing Limited
    • Ottis, R. (2009). Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability. 8th European Conference on Information Warfare and Security (pp. 177-182). Academic Publishing Limited.
    • (2009) 8th European Conference on Information Warfare and Security , pp. 177-182
    • Ottis, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.