Symantec Global Internet Security Threat Report: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(13 intermediate revisions by the same user not shown)
Line 9: Line 9:


==Categorization==
==Categorization==
 
* Resource by Type: [[Industry Reports]]
* Overview: [[Industry Reports]]
 
* Threats and Actors: [[Financial Institutions and Networks]]
* Threats and Actors: [[Financial Institutions and Networks]]
* Issues: [[Cybercrime]]; [[Economics of Cybersecurity]]


==Key Words==  
==Key Words==  
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Antivirus | Antivirus]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Crimeware | Crimeware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hacker]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hacker]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Honeypot | Honeypot]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Scareware | Scareware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Whitelist | Whitelist]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]]
 
 
Symantec, virus, cybercrime, phishing, honeypot, malicious code, spam, attacks, security, hacker


==Synopsis==
==Synopsis==
Line 50: Line 51:


==Additional Notes and Highlights==
==Additional Notes and Highlights==
Expertise Required: Technology - Low/Moderate


[http://www4.symantec.com/Vrt/wl?tu_id=Lfsd1271711507050126203  Executive Summary]
[http://www4.symantec.com/Vrt/wl?tu_id=Lfsd1271711507050126203  Executive Summary]

Latest revision as of 15:18, 23 July 2010

Full Title of Reference

Symantec Global Internet Security Threat Report: Trends for 2009

Full Citation

Symantec Corporation, Symantec Global Internet Security Threat Report: Trends for 2009 (2010). Online Paper. Web

BibTeX

Categorization

Key Words

Antivirus, Botnet, Crimeware, Cyber Crime, Hacker, Honeypot, Malware, Patching, Phishing, Scareware, Social Engineering, SPAM, Trojan, Whitelist, Worm, Zero-Day Exploit

Synopsis

Symantec gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, Symantec’s distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.

Spam and phishing data is captured through a variety of sources including: the Symantec Probe Network, a system of more than 5 million decoy accounts; MessageLabs Intelligence, a respected source of data and analysis for messaging security issues, trends and statistics; and other Symantec technologies. Data is collected in more than 86 countries. Over 8 billion email messages, as well as over 1 billion Web requests, are processed per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors and more than 50 million consumers.

These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the Symantec Global Internet Security Threat Report, which gives enterprises and consumers essential information to effectively secure their systems now and into the future

Additional Notes and Highlights

Expertise Required: Technology - Low/Moderate

Executive Summary