Page 364 -
P. 364
Chapter 8 Securing Information Systems 363
Europe’s information infrastructure, promote secu- November 17, 2010); Robert McMillan, “Estonia Ready for
rity standards, and educate the general public about the Next Cyberattack,” Computerworld, April 7, 2010 (www.
computerworld. com/s/article/9174923/Estonia_readies_for_
security issues.
the_next_cyber attack, accessed November 17, 2010); “Another
ENISA organized the first pan-European Critical Cyber Attack Hits Europe,” Internet Business Law Services,
Information Infrastructure Protection (CIIP) exer- June 18, 2007 (www.ibls.com/internet_law_news_portal_view.
cise, which took place in November 2010. This exer- aspx?id=1782&s= latestnews, accessed November 17, 2010);
“New Cyber Attack Hits Norway,” Views and News from Norway,
cise tested the efficiency of procedures and com-
August 30, 2010 (www.newsinenglish.no/2010/08/30/new-cyber-
munication links between member states in case an attacks-hit-norway, accessed November 17, 2010); Gregg Keiser,
incident were to occur that would affect the normal “Is Stuxnet the ‘Best’ Malware Ever?” Computerworld, September
operation of the Internet. ENISA acts as a facilitator 16, 2010; Robert McMillan, “Was Stuxnet Built to Attack Iran’s
Nuclear Program,” Computerworld, September 21 2010 (www.
and information broker for the Computer Emergency
computerworld.com/s/article/9186920/Was_Stuxnet_built_t
Response Teams (CERT), working with the public and o_attack_Iran_s_nuclear_program_, accessed November 17,
private sectors of most EU member states. 2010); Ellen Messmer, “Downadup/Conflicker Worm. When Will
The European Commission has recently launched the Next Shoe Fall?” Network World, January 23 2009 (www.
networkworld.com/news/2009/012309-downadup-conflicker-
the Digital Agenda for Europe. The goal of this ini-
worm.html?hpg1=bn, accessed November 17, 2010); Erik Larkin,
tiative is to define the key role that information and “Protecting Against the Rampant Conflicker Worm,” PCWorld,
communication technologies will play in 2020. The January 16, 2009; “War in the Fifth Domain,” The Economist,
initiative calls for a single, open European digital July 1, 2010 (www.economist.com/node/16478792, accessed
market. Another goal is that broadband speeds of November 17, 2010).
30Mbps be available to all European citizens by 2020.
In terms of security, the initiative is considering the CASE STUDY QUESTIONS
implementation of measures to protect privacy and
1. What is a botnet?
the establishment of a well-functioning network of
2. Describe some of the main points of the Digital
CERT to prevent cybercrime and respond effectively
Agenda for Europe.
to cyber attacks.
3. Explain how a cyber attack can be carried out.
4. Describe some of the weaknesses exploited by
Sources: “Digital Agenda for Europe,” European Commission, malware.
August 2010 (http://ec.europa.eu/information_society/ digi-
talagenda/ index_en.htm, accessed October 20, 2010); “The
Cyber Raiders Hitting Estonia,” BBC News, May 17, 2007 Case contributed by Daniel Ortiz-Arroyo, Aalborg
University
(http://news.bbc.co.uk/2/hi/europe/6665195.stm, accessed
MIS_13_Ch_08 Global.indd 363 1/17/2013 3:10:24 PM