P. 1
Volunteers and Cyber Security - Options for Georgia. Mikheil Basilaia

Volunteers and Cyber Security - Options for Georgia. Mikheil Basilaia

Ratings: (0)|Views: 2,771|Likes:
Published by Mikheil Basilaia
The thesis explores possibilities to develop defensive cyber capabilities of Georgia by finding practical ways to overcome the qualified manpower shortage in the cyber security sector. The work focuses on leveraging the volunteer option.
The thesis brings relevant examples of potential solutions from Estonia (Cyber Defense Unit), the UK (Land Information Assurance Group – LIAG; Warning, Advice and Reporting Point – WARP), the USA (cyber units of Reserve Component of US armed forces), China (cyber militias), Russia (patriotic cyber volunteers) and also discusses possibilities which can arise from the Georgian environment. The thesis will not only discuss probable positive solutions, but also argue why some solutions will not work for Georgia.
Potential solutions should be applicable to and implementable in Georgia taking into account its current IT environment, political, economic, social factors and resources that Georgia could realistically allocate for solutions in the coming years. Georgian example can also be useful for other small countries with limited financial and human resources.
The sources of the thesis are research papers, books, (independent) experts from Estonia and Georgia, representatives of governmental agencies of Georgia, as well as supporting material from popular media.
The thesis is written in English, consists of 72 pages, 6 chapters, 3 figures and 4 tables.
The thesis explores possibilities to develop defensive cyber capabilities of Georgia by finding practical ways to overcome the qualified manpower shortage in the cyber security sector. The work focuses on leveraging the volunteer option.
The thesis brings relevant examples of potential solutions from Estonia (Cyber Defense Unit), the UK (Land Information Assurance Group – LIAG; Warning, Advice and Reporting Point – WARP), the USA (cyber units of Reserve Component of US armed forces), China (cyber militias), Russia (patriotic cyber volunteers) and also discusses possibilities which can arise from the Georgian environment. The thesis will not only discuss probable positive solutions, but also argue why some solutions will not work for Georgia.
Potential solutions should be applicable to and implementable in Georgia taking into account its current IT environment, political, economic, social factors and resources that Georgia could realistically allocate for solutions in the coming years. Georgian example can also be useful for other small countries with limited financial and human resources.
The sources of the thesis are research papers, books, (independent) experts from Estonia and Georgia, representatives of governmental agencies of Georgia, as well as supporting material from popular media.
The thesis is written in English, consists of 72 pages, 6 chapters, 3 figures and 4 tables.

More info:

Published by: Mikheil Basilaia on Jun 18, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/27/2013

pdf

text

original

 
XAIIMFF _FMSOTPMX] JC XO@BFJIJE]
Ca`uix} jc Mfcjtkaxmjf Xo`bfjije}Ho~atxkofx jc @jk~uxot P`mof`o@bamt jc Foxjtl PjcxatoMXM5>IX
Sjiufxootp afh @}dot Po`utmx}7 J~xmjfp cjt Eojtema
KapxotXbopmp
Pxuhofx7 Kmlbomi DapmiamaPxuhofx @jho7 1>3=03 MS@K
Pu~otsmpjt7 Tamf Jxxmp) ^bH^tjc& Xafoi XakkoxXaiimff) 4>14
 
4
Ho`iataxmjfBotod} M ho`iato xbax xbmp Kapxot”p xbopmp) k}mfsopxmeaxmjf afha`bmosokofx) pudkmxxoh cjt xboKapxot”phoetoo ax Xaiimff _fmsotpmx} jcXo`bfjije} bap fjx doof pudkmxxoh cjt af} a`ahokm`hoetoo jt orakmfaxmjf axaf} jxbot ufmsotpmx}&* Kmlbomi Dapmiama *"Pmefaxuto afh haxo-
 
0
Sjiufxootp afh @}dot Po`utmx}7 J~xmjfp cjt Eojtema
KapxotXbopmp
Affjxaxmjf
Xbo xbopmp or~ijtop ~jppmdmimxmop xj hosoij~ hocofpmso `}dot `a~admimxmop jc Eojtema d} cmfhmfe ~ta`xm`ai a}p xj jsot`jkoxbo quaimcmoh kaf~jot pbjtxaeo mf xbo `}dot po`utmx} po`xjt& Xbojtlcj`upop jf iosotaemfe xbo sjiufxoot j~xmjf&Xbo xbopmp dtmfep toiosafx orak~iop jc ~jxofxmai pjiuxmjfp ctjk Opxjfma "@}dot Hocofpo _fmx-)xbo _L "Iafh Mfcjtkaxmjf Apputaf`o Etju~ ‐IMAE< Uatfmfe) Ahsm`o afh To~jtxmfe ^jmfx ‐ UAT^-) xbo _PA"`}dot ufmxp jc Topotso @jk~jfofx jc _P atkoh cjt`op-) @bmfa"`}dot kmimxmap-) Tuppma"~axtmjxm` `}dot sjiufxootp- afh aipj hmp`uppop~jppmdmimxmopbm`b `af atmpo ctjkxbo Eojtemaf ofsmtjfkofx& Xboxbopmp mii fjx jfi} hmp`upp ~tjdadio ~jpmxmso pjiuxmjfp) dux aipjateuo b} pjko pjiuxmjfp mii fjx jtl cjt Eojtema&^jxofxmai pjiuxmjfp pbjuih do a~~im`adio xj afh mk~iokofxadio mf Eojtema xalmfe mfxj a``jufx mxp`uttofx MX ofsmtjfkofx) ~jimxm`ai) o`jfjkm`) pj`mai ca`xjtp afh topjut`op xbax Eojtema `juihtoaimpxm`aii}aiij`axo cjt pjiuxmjfp mf xbo `jkmfe }oatp&Eojtemaf orak~io `af aipj doupocui cjt jxbot pkaii `jufxtmop mxb imkmxoh cmfaf`mai afh bukaf topjut`op&Xbo pjut`op jc xbo xbopmp atotopoat`b ~a~otp)djjlp)"mfho~ofhofx- or~otxp ctjk Opxjfma afhEojtema) to~topofxaxmsop jc ejsotfkofxai aeof`mop jc Eojtema) ap oii ap pu~~jtxmfe kaxotmaictjk ~j~uiat kohma&Xbo xbopmp mp tmxxof mf Ofeimpb) `jfpmpxp jc 54~aeop) 3 `ba~xotp) 0 cmeutopafh 8 xadiop&

Activity (6)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->