Premium Content

Access "Perspectives: The Lesson of Estonia"

Published: 22 Oct 2012

Were the attacks on Estonia state-sponsored cyberterrorism? Probably not, but the month-long protest signals a troubling trend. Reports on the cyber assault against Estonia this spring once again raised the specter of pending doom in cyberspace--the "electronic Pearl Harbor" that always seems to be just over the horizon. One headline even upped the doomsday language to "cyber nuclear winter." Is all this hype, as many experts have argued, or should we worry about cyberterrorism? So far, no attack in cyberspace has come close to bringing about the devastation, grief and political consequences of Pearl Harbor or Sept. 11, let alone nuclear war. Certainly not the cyber protest against Estonia, which left no one dead or even physically injured. Yet the assault deserves our attention, as it took online activism to a new, worrisome level. In one of the first cases of Internet-based protest 12 years ago, cyber activists conducted a one-hour "netstrike" against the French government. At the appointed hour, participants amassed at selected Web sites and repeatedly ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • Malware Analysis

      Norman SandBox Analyzer Pro

    • Rootkit detection and removal know-how

      Get advice on how to detect malware and rootkits and the best ways to achieve rootkit removal and prevent hacker attacks.

    • Logical, physical security integration challenges

      Integrating physical and IT security can reap considerable benefits for an organization, including enhanced efficiency and compliance plus improved security. But convergence isn't easy. Challenges include bringing the physical and IT security teams together, combining heterogenous systems, and upgrading a patchwork of physical access systems.

    • SIM and NBA product combination is powerful

      The recent announcement that Mazu Networks, a provider of network-based analysis (NBA) tools, and eIQnetworks, a supplier of SIM products, underscores the trend towards convergence in the NBA and SIM markets. The value proposition is clear: two useful network/security data analysis tools in one integrated package.

    • Virtualization

      BufferZone Enterprise

More Premium Content Accessible For Free