Symantec Global Internet Security Threat Report: Difference between revisions
No edit summary |
|||
(24 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==Symantec Global Internet Security Threat Report: Trends for 2009 | ==Full Title of Reference== | ||
Symantec Global Internet Security Threat Report: Trends for 2009 | |||
==Full Citation== | ==Full Citation== | ||
Symantec Corporation | Symantec Corporation, ''Symantec Global Internet Security Threat Report: Trends for 2009'' (2010). Online Paper. [http://www4.symantec.com/Vrt/wl?tu_id=SUKX1271711282503126202 ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Symantec:2010 ''BibTeX''] | |||
==Categorization== | ==Categorization== | ||
* Resource by Type: [[Industry Reports]] | |||
* Threats and Actors: [[Financial Institutions and Networks]] | |||
* Issues: [[Cybercrime]]; [[Economics of Cybersecurity]] | |||
==Key Words== | ==Key Words== | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Antivirus | Antivirus]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Crimeware | Crimeware]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hacker]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Honeypot | Honeypot]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Scareware | Scareware]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Whitelist | Whitelist]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]] | |||
==Synopsis== | ==Synopsis== | ||
Line 36: | Line 51: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Expertise Required: Technology - Low/Moderate | |||
[http://www4.symantec.com/Vrt/wl?tu_id=Lfsd1271711507050126203 Executive Summary] |
Latest revision as of 15:18, 23 July 2010
Full Title of Reference
Symantec Global Internet Security Threat Report: Trends for 2009
Full Citation
Symantec Corporation, Symantec Global Internet Security Threat Report: Trends for 2009 (2010). Online Paper. Web
Categorization
- Resource by Type: Industry Reports
- Threats and Actors: Financial Institutions and Networks
- Issues: Cybercrime; Economics of Cybersecurity
Key Words
Antivirus, Botnet, Crimeware, Cyber Crime, Hacker, Honeypot, Malware, Patching, Phishing, Scareware, Social Engineering, SPAM, Trojan, Whitelist, Worm, Zero-Day Exploit
Synopsis
Symantec gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, Symantec’s distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.
Spam and phishing data is captured through a variety of sources including: the Symantec Probe Network, a system of more than 5 million decoy accounts; MessageLabs Intelligence, a respected source of data and analysis for messaging security issues, trends and statistics; and other Symantec technologies. Data is collected in more than 86 countries. Over 8 billion email messages, as well as over 1 billion Web requests, are processed per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors and more than 50 million consumers.
These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the Symantec Global Internet Security Threat Report, which gives enterprises and consumers essential information to effectively secure their systems now and into the future
Additional Notes and Highlights
Expertise Required: Technology - Low/Moderate