Page 364 -
P. 364

Chapter 8 Securing Information Systems 363


               Europe’s information infrastructure, promote secu-   November 17, 2010); Robert McMillan, “Estonia Ready for
               rity standards, and educate the general public about   the Next Cyberattack,” Computerworld, April 7, 2010 (www.
                                                                    computerworld. com/s/article/9174923/Estonia_readies_for_
               security issues.
                                                                    the_next_cyber attack, accessed November 17, 2010); “Another
                  ENISA organized the first pan-European Critical   Cyber Attack Hits Europe,” Internet Business Law Services,
               Information Infrastructure Protection (CIIP) exer-   June 18, 2007 (www.ibls.com/internet_law_news_portal_view.
               cise, which took place in November 2010. This exer-  aspx?id=1782&s= latestnews, accessed November 17, 2010);
                                                                    “New Cyber Attack Hits Norway,” Views and News from Norway,
               cise tested the efficiency of procedures and com-
                                                                    August 30, 2010 (www.newsinenglish.no/2010/08/30/new-cyber-
               munication links between member states in case an    attacks-hit-norway, accessed November 17, 2010); Gregg Keiser,
               incident were to occur that would affect the normal   “Is Stuxnet the ‘Best’ Malware Ever?” Computerworld, September
               operation of the Internet. ENISA acts as a facilitator   16, 2010; Robert McMillan, “Was Stuxnet Built to Attack Iran’s
                                                                    Nuclear Program,” Computerworld, September 21 2010 (www.
               and information broker for the Computer Emergency
                                                                    computerworld.com/s/article/9186920/Was_Stuxnet_built_t
               Response Teams (CERT), working with the public and   o_attack_Iran_s_nuclear_program_, accessed November 17,
               private sectors of most EU member states.            2010); Ellen Messmer, “Downadup/Conflicker Worm. When Will
                  The European Commission has recently launched     the Next Shoe Fall?” Network World, January 23 2009 (www.
                                                                    networkworld.com/news/2009/012309-downadup-conflicker-
               the Digital Agenda for Europe. The goal of this ini-
                                                                    worm.html?hpg1=bn, accessed November 17, 2010); Erik Larkin,
               tiative is to define the key role that information and   “Protecting Against the Rampant Conflicker Worm,” PCWorld,
               communication technologies will play in 2020. The    January 16, 2009; “War in the Fifth Domain,” The Economist,
               initiative calls for a single, open European digital   July 1, 2010 (www.economist.com/node/16478792, accessed
               market. Another goal is that broadband speeds of     November 17, 2010).
               30Mbps be available to all European citizens by 2020.
               In terms of security, the initiative is considering the   CASE STUDY QUESTIONS
               implementation of measures to protect privacy and
                                                                    1. What is a botnet?
               the establishment of a well-functioning network of
                                                                    2. Describe some of the main points of the Digital
               CERT to prevent cybercrime and respond effectively
                                                                       Agenda for Europe.
               to cyber attacks.
                                                                    3. Explain how a cyber attack can be carried out.
                                                                    4. Describe some of the weaknesses exploited by
               Sources: “Digital Agenda for Europe,” European Commission,   malware.
               August 2010 (http://ec.europa.eu/information_society/ digi-
               talagenda/ index_en.htm, accessed October 20, 2010); “The
               Cyber Raiders Hitting Estonia,” BBC News, May 17, 2007   Case contributed by Daniel Ortiz-Arroyo, Aalborg
                                                                       University
               (http://news.bbc.co.uk/2/hi/europe/6665195.stm, accessed










































   MIS_13_Ch_08 Global.indd   363                                                                             1/17/2013   3:10:24 PM
   359   360   361   362   363   364   365   366   367   368   369