Skip to main content

Week 10: Cybersecurity in Estonia

In this week’s blog I am going to talk about cybersecurity in Estonia based on the Kevin Mitnick formula. The formula describes security by three aspects: technology, training and policies.

The first aspect - technology - covers encryption, firewalls, antivirus software, etc. Training, in my opinion, one of the most important parts, covers security awareness in general amongst people. And finally, policies, which is more of the bureaucratic part, having rules on who can do what.

In general, when it comes to technology, I would say that Estonia is well ahead of most countries, as pretty much all of our public services have been available online for quite some time now. We have an e-voting system, e-residency, and pretty much everyone owns an ID card which allows you to use banks, healthcare systems all online. So for that to be reliable, Estonia had to and has to contribute quite a lot to the security aspect of it.

When it comes to training, after the 2007 cyberattacks on Estonia, the country has taken it a lot more seriously. In 2008 a cyber defense center (NATO Cooperative Cyber Defence Centre of Excellence or the CCD COE) was created here in Tallinn, which focuses on research, development, and training. By training, Estonia has become more prepared for future cyber-attacks.

I would say that the biggest deficiencies are in the policy aspect, but I think that's in pretty much every country, as cyber-crime is still so new and fastly growing that the slow and bureaucratic aspect of fighting against it just can't keep up. But Estonia is at least a good example of a country that is trying to bring awareness to this aspect and is working on the problem on a multinational level with allies, as cybercrime is a borderless problem.

Compared to some other countries, overall Estonia is quite developed in the field and one of the leading countries in cybersecurity, altho we still have room for improvement. So hopefully, we won't just rest on our laurels and will continue to develop cybersecurity in our country.

Comments

Popular posts from this blog

Week 9: Examples of bad and good HCI

With technology developing rapidly, we find all sorts of new ways to improve our lives and how we interact with technology. With technological innovation, we might witness the creation of something life-changing and spectacular or something that just no one even asked for. I'll try to bring examples of both worlds. Firstly I'd like to bring a good example of HCI - eye-tracking. I recently watched either a video on YouTube or a documentary on Netflix (can't really member which) that showed how eye-tracking technologies have changed the lives of people suffering from illnesses like locked-in syndrome. Locked-in syndrome is a condition where people have full cognitive ability but they are unable to move or speak due to paralysis of voluntary muscles. So usually they can only move their eyes, and that's about it, although some can't even do that. They are literally locked in their bodies unable to move and communicate with others. But thanks to eye-tracking, people that...

Wiki Review: The Chinese Social Credit System

For my Wiki review I chose a paper by Bálint Adám, Dominik Kovács, Benedek Matveev, Luca Mizzi and Carlos Rodriguez on The Chinese Social Credit System. I think the topic chosen is really interesting, hence why I chose this article to review, and important at the same time. As the Chinese government is really invading people's privacy, at least in my opinion, by tracking its citizens and companies. It's important to know about the problem so we could avoid this also happening in the western world. All in all, I think the most important aspects of the topic got covered, at least what I was hoping to learn from it while reading the article, and it was presented in a good manner so it was interesting to read. The structure of the article was good, it was organized in a logical way and was divided into subcategories, although they could have been tied a bit better. The viewpoint or angle of the article was for the most part pretty neutral as it should be. Maybe it was a bit to the...

Week 2: Pre-web technologies vs the web

Fax Fax or facsimile or telecopying is the telephonic transmission of scanned-in printed material, which used to be a popular way of sending printed pictures and documents wirelessly to others. It was in 1843 when a Scottish inventor and mechanic named Alexander Bain received a British patent for his invention - “improvements in producing and regulating electric currents and improvements in timepieces and in electric printing and signal telegraphs.” But later on an English physicist, Frederick Bakewell improved Bain's invention, which was much more similar to the fax machines that we have today.  Although the concept of fax comes from the 1800s, fax machines and faxing didn't become widespread until the 1980s, when it became more inexpensive. But as technology has evolved, fax has become obsolete as it has become outdated and ineffective compared to the digital alternatives that we have now. As fax has built-in security flaws and excessively wastes resources like paper it...