An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News
NEWS | Oct. 21, 2017

Benchmarking Estonia's Cyber Security: An On-Ramping Methodology for Rapid Adoption and Implementation

By Lt. Col. Ernest Wong, Nancy Porter, McKinnon Hokanson, Bing Bing Xie

In April of 2007, Estonia fell victim to a series of distributed denial of service (DDoS) attacks that crippled its government websites, email servers, media outlets, and banking system for nearly a month. Due to the devastating effects of these cyber attacks, Estonia took great efforts to strengthen its cyber security protocols. This research analyzes the reforms that Estonia has implemented in its domestic and foreign policies and attempts to determine if any of it systemic improvements can help to also bolster cyber security in the United States (US). The findings from this research are that Estonia’s policy reforms in cyber security have been the most significant in areas that the US currently lacks. Domestically, Estonia has a cyber education program that significantly highlights awareness of the risks to its critical cyber infrastructure. Estonia has also promoted public and private partnerships to jointly analyze, assess, and defend itself against future cyber attacks.. In foreign affairs, Estonia has bolstered its relationship with allied nations in new ways and has synchronized its foreign policies to improve stakeholder engagement on cyber defense. The critical changes that Estonia has adopted and implemented throughout the past decade are what this research endeavors to recommend for the US to consider into its defense of the cyber domain. Furthermore, this research proposes an on-ramping methodology that helps to frame how an organization can more easiliy integrate new processes, practices, and procedures that have worked well for others.

 

READ MORE

 

PUBLICATIONS
What Does the Future Hold for Jack Voltaic Cyber Exercise?
September 25, 2024

Data Privacy and Security as a National Security Imperative
October 30, 2023

Command by intent can ensure command post survivability
August 29, 2023

The Tipping Point for Army Distributed Command and Control
August 1, 2023

Acknowledging the Realities of the Cyber Workforce
July 20, 2023

The Buzz About Electromagnetic Pulse Weapons
July 19, 2023

Book review: ‘On Disinformation’ by Lee McIntyre
July 19, 2023

IRREGULAR WARFARE PODCAST: EXPLORING CYBER POLICY IN THE DEPARTMENT OF DEFENSE
June 20, 2023

ARE WE ASKING TOO MUCH OF CYBER?
May 3, 2023

West Point hosts Joint Service Academy Cybersecurity Summit as industry, government collaborate to defend against cyber threats
April 13, 2023