Web Hosting News

  Home arrow Web Hosting News arrow Page 4 - Estonia Survives Internet`s First Cybe...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Estonia Survives Internet`s First Cyberwar
By: Terri Wells
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 9

    Table of Contents:
  • Estonia Survives Internet`s First Cyberwar
  • Attack and Defense
  • Political Fallout
  • A Future Cyberwar?

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Estonia Survives Internet`s First Cyberwar - A Future Cyberwar?

    (Page 4 of 4 )

    Some observers have warned that the attack on Estonia may only have been a warm-up for things to come. The Boston Globe noted that there are a number of extremist Islam and pro-terrorist web sites which train users in Internet hacking skills. This is particularly disturbing in light of the United States Government Accounting Office assessing its government’s information systems and critical infrastructures as being in a “high-risk” category. Worse, this isn’t news; the GAO has been complaining about this for the past decade.

    It can be hard to fight cyber terrorism in the planning stages; close down one site and it pops up somewhere else. A cooperative effort may be required. Meanwhile, not all threats can be traced to any particular political agenda. Take the Storm worm, for example. Between July 16 and August 1, software security firm Postini recorded an astonishing 415 million spam emails luring users to sites that would infect their PCs and turn them into zombies. That’s about thirty times as many nasty spam messages as you would expect during the same period. Meanwhile, researchers at security firm SecureWorks estimate that the Storm botnet has grown to 1.7 million machines.

    How do you prepare against the potential onslaught from a botnet that large? The attack on Estonia taught us that back up systems in case the network goes down may be a step in the right direction. Estonia’s strength in the sense of how wired it is proved to be a weakness in this case. Another way to be prepared is to be flexible about the definition of “infrastructure.” The attackers didn’t go for transportation or energy sites; they went for banking, news, and government sites, with the apparent intention of paralyzing the country. The Estonian government had to make some tough choices about which sites to focus on keeping up and which sites to give a lower priority – low enough to go offline.

    Some countries might fare better in the case of a cyber war than others. Forbes recently ran an article about China’s Great Firewall. It’s well known that China’s filters clamp down to keep the country’s citizens from seeing politically sensitive material. That same control can block both inbound and outbound traffic, which means that China is probably better prepared to fend off cyber attacks.

    Erecting this kind of firewall would creep out a lot of US citizens, to say the least. But Estonia has shown us that the days of cyber warfare may have already arrived. Even if, as some say, the attackers were no more than a mob, “The use of the Internet to create an online mob has been proven,” says Gadi Evron, a security evangelist for Beyond Security who studied the attack on Estonia. We need to be ready to face this kind of mob – and maybe worse – in the future. 

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - FreedomPop Offering Open Wi-Fi Service
    - Go Daddy Goes to India
    - Netelligent, Savvis Add New Canadian Web Hos...
    - World IPv6 Launch Happens Today
    - IT Teams Struggle to Keep Pace with Malware
    - Lulz Security Hacks CIA, Takes Requests
    - Apple Unveils iCloud
    - Rackspace Introduces Cloud Load Balancers
    - Amazon Offers Cloud Drive, Disses Music Indu...
    - New Android.Pjapps Trojan
    - Copyright Fight over Hurt Locker Downloads I...
    - Data Reveals Many Browsers Remain Unpatched
    - PandaLabs Report - What Happens to Stolen In...
    - Safari Books Online Review
    - Hackers Targeting Human Rights Groups

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap