Skip to main content

Week 10: Cybersecurity in Estonia

In this week’s blog I am going to talk about cybersecurity in Estonia based on the Kevin Mitnick formula. The formula describes security by three aspects: technology, training and policies.

The first aspect - technology - covers encryption, firewalls, antivirus software, etc. Training, in my opinion, one of the most important parts, covers security awareness in general amongst people. And finally, policies, which is more of the bureaucratic part, having rules on who can do what.

In general, when it comes to technology, I would say that Estonia is well ahead of most countries, as pretty much all of our public services have been available online for quite some time now. We have an e-voting system, e-residency, and pretty much everyone owns an ID card which allows you to use banks, healthcare systems all online. So for that to be reliable, Estonia had to and has to contribute quite a lot to the security aspect of it.

When it comes to training, after the 2007 cyberattacks on Estonia, the country has taken it a lot more seriously. In 2008 a cyber defense center (NATO Cooperative Cyber Defence Centre of Excellence or the CCD COE) was created here in Tallinn, which focuses on research, development, and training. By training, Estonia has become more prepared for future cyber-attacks.

I would say that the biggest deficiencies are in the policy aspect, but I think that's in pretty much every country, as cyber-crime is still so new and fastly growing that the slow and bureaucratic aspect of fighting against it just can't keep up. But Estonia is at least a good example of a country that is trying to bring awareness to this aspect and is working on the problem on a multinational level with allies, as cybercrime is a borderless problem.

Compared to some other countries, overall Estonia is quite developed in the field and one of the leading countries in cybersecurity, altho we still have room for improvement. So hopefully, we won't just rest on our laurels and will continue to develop cybersecurity in our country.

Comments

Popular posts from this blog

Week 9: Examples of bad and good HCI

With technology developing rapidly, we find all sorts of new ways to improve our lives and how we interact with technology. With technological innovation, we might witness the creation of something life-changing and spectacular or something that just no one even asked for. I'll try to bring examples of both worlds. Firstly I'd like to bring a good example of HCI - eye-tracking. I recently watched either a video on YouTube or a documentary on Netflix (can't really member which) that showed how eye-tracking technologies have changed the lives of people suffering from illnesses like locked-in syndrome. Locked-in syndrome is a condition where people have full cognitive ability but they are unable to move or speak due to paralysis of voluntary muscles. So usually they can only move their eyes, and that's about it, although some can't even do that. They are literally locked in their bodies unable to move and communicate with others. But thanks to eye-tracking, people that

Wiki Review: The Chinese Social Credit System

For my Wiki review I chose a paper by Bálint Adám, Dominik Kovács, Benedek Matveev, Luca Mizzi and Carlos Rodriguez on The Chinese Social Credit System. I think the topic chosen is really interesting, hence why I chose this article to review, and important at the same time. As the Chinese government is really invading people's privacy, at least in my opinion, by tracking its citizens and companies. It's important to know about the problem so we could avoid this also happening in the western world. All in all, I think the most important aspects of the topic got covered, at least what I was hoping to learn from it while reading the article, and it was presented in a good manner so it was interesting to read. The structure of the article was good, it was organized in a logical way and was divided into subcategories, although they could have been tied a bit better. The viewpoint or angle of the article was for the most part pretty neutral as it should be. Maybe it was a bit to the

Week 6: Copyleft

Continuing on the topic of copyright issues, this week's post will be about Copyleft and what impact it has on choosing a software license for one's project.  So first of all, what even is Copyleft? Some of you might have heard of this term before in association with open-source software. Well, it's a license for free content/software that determines whether or not the derived works are influenced by the license or not. In contrast to copyright, copyleft ensures that the code/content is freely available for use and modification, whereas copyright more restricts uses.  There are three different grades of copyleft: Strong copyleft - one of the most famous examples is definitely GNU GPL, which was also the first copyleft license. This basically means that the license applies to all derived works and you are obligated to publish the source code if you distribute code that was derived from theirs. Weak copyleft - an example of this would be GNU Lesser General Public License. T