01.12.2012 Views

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

hance s<str<strong>on</strong>g>of</str<strong>on</strong>g>tware systems security at <str<strong>on</strong>g>the</str<strong>on</strong>g> design and development stages.<br />

The result <str<strong>on</strong>g>of</str<strong>on</strong>g> performance <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> neural network and <str<strong>on</strong>g>the</str<strong>on</strong>g> advantage <str<strong>on</strong>g>of</str<strong>on</strong>g> this<br />

approach is presented in this paper. This study found that attack patterns<br />

can be matched to <str<strong>on</strong>g>the</str<strong>on</strong>g>ir corresp<strong>on</strong>ding security patterns using a neural<br />

network that has been trained for this purpose. Therefore, s<str<strong>on</strong>g>of</str<strong>on</strong>g>tware developers<br />

using <str<strong>on</strong>g>the</str<strong>on</strong>g> trained neural network as a tool can easily be guided into<br />

selecting <str<strong>on</strong>g>the</str<strong>on</strong>g> appropriate security patterns meeting <str<strong>on</strong>g>the</str<strong>on</strong>g> security requirements<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g>ir s<str<strong>on</strong>g>of</str<strong>on</strong>g>tware applicati<strong>on</strong>.<br />

Keywords: security pattern, attack pattern, neural network<br />

An Excepti<strong>on</strong>al war That Ended in Victory for Est<strong>on</strong>ia<br />

or an Ordinary e-Disturbance? Est<strong>on</strong>ian Narratives<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> Cyber-Attacks in 2007<br />

Kari Alenius<br />

Department <str<strong>on</strong>g>of</str<strong>on</strong>g> History, University <str<strong>on</strong>g>of</str<strong>on</strong>g> Oulu, Finland<br />

Abstract: In <str<strong>on</strong>g>the</str<strong>on</strong>g> spring <str<strong>on</strong>g>of</str<strong>on</strong>g> 2007 Est<strong>on</strong>ia became <str<strong>on</strong>g>the</str<strong>on</strong>g> victim <str<strong>on</strong>g>of</str<strong>on</strong>g> a large-scale<br />

cyber-attack. Estimates <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> significance <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g>se events vary both in and<br />

outside <str<strong>on</strong>g>of</str<strong>on</strong>g> Est<strong>on</strong>ia. For those who regard <str<strong>on</strong>g>the</str<strong>on</strong>g> events as being excepti<strong>on</strong>ally<br />

important, <str<strong>on</strong>g>the</str<strong>on</strong>g> cyber-attacks launched against Est<strong>on</strong>ia are seen as a milest<strong>on</strong>e<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> modern warfare. Sometimes <str<strong>on</strong>g>the</str<strong>on</strong>g> term “Web War One” has even<br />

been used. At <str<strong>on</strong>g>the</str<strong>on</strong>g> o<str<strong>on</strong>g>the</str<strong>on</strong>g>r extreme, <str<strong>on</strong>g>the</str<strong>on</strong>g> events have been underestimated<br />

and <str<strong>on</strong>g>the</str<strong>on</strong>g>ir distinctiveness has been disputed. This study does not attempt to<br />

answer <str<strong>on</strong>g>the</str<strong>on</strong>g> questi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> which perspective is “right” and which is “wr<strong>on</strong>g”,<br />

especially when it is particularly difficult to provide an objective answer to<br />

this type <str<strong>on</strong>g>of</str<strong>on</strong>g> questi<strong>on</strong>. Instead, this study analyses Est<strong>on</strong>ian interpretati<strong>on</strong>s<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> what occurred. The central elements <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> Est<strong>on</strong>ian main narrative<br />

crystallized during <str<strong>on</strong>g>the</str<strong>on</strong>g> summer and fall 2007. The narrative came to be<br />

composed <str<strong>on</strong>g>of</str<strong>on</strong>g> a few key elements describing <str<strong>on</strong>g>the</str<strong>on</strong>g> entire c<strong>on</strong>flict in general<br />

and in a stereotypical way.<br />

Keywords: rhetoric, narratives, cyber-attack, Est<strong>on</strong>ia<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!