Difference between revisions of "2010 Top Cyber Security Risks Report"

From Cybersecurity Wiki
Jump to: navigation, search
(Additional Notes and Highlights)
(Synopsis)
Line 27: Line 27:
 
==Synopsis==
 
==Synopsis==
  
In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike. The threats discussed are:
+
In 2010, information security threats are striking networks with more sophisticated techniques than ever and exploit reports continue to dominate the media.  The collective findings described within this report establish the fact that the proliferation of technology, along with the quick and effortless manner in which that technology is accessed, is dramatically and negatively impacting security. While we are not advocates for making technology more difficult, we do advocate implementing common sense security policies and technologies that battle well-known and new threats. This report evaluates some of the most significant security liabilities that the enterprise is facing today. The report focuses on four key areas:
 
+
* Increased Consumerization of Enterprise Computing
* Downad/Conficker Network Worm
+
* Prolonged and Persistent Targeting of Web Applications
* Koobface Social Network Worm
+
* Increased Organization and Sophistication of Attackers
* Zeus/Zbot Crimeware
+
* The Unrelenting Presence of Legacy Threats
* Rogue Antivirus Applications
+
In addition to explaining how and where the enterprise is vulnerable, the report provides insights into how organizations can protect themselves
* Zero-Day Exploits
+
from attack, including what the next generation of computing should look like to maximize security for the corporate network.
 
+
Unlike the [[Symantec Global Internet Security Threat Report]], trend Trend Micro report is primarily concerned with the threats themselves and does not provide an extensive statistical or financial discussion of cybercrime or its prevalence.
+
  
 
==Additional Notes and Highlights==
 
==Additional Notes and Highlights==
  
 
Expertise Required: Technology - Moderate
 
Expertise Required: Technology - Moderate

Revision as of 09:25, 21 September 2010

Full Title of Reference

2010 Top Cyber Security Risks Report

Full Citation

HP TippingPoint DVLabs, 2010 Top Cyber Security Risks Reports (2010). Online Paper. Web

BibTeX

Categorization

Key Words

Antivirus, Botnet, Cyber Crime, Malware, Patching, Phishing, Social Engineering, SPAM, Trojan, Worm, Zero-Day Exploit

Synopsis

In 2010, information security threats are striking networks with more sophisticated techniques than ever and exploit reports continue to dominate the media. The collective findings described within this report establish the fact that the proliferation of technology, along with the quick and effortless manner in which that technology is accessed, is dramatically and negatively impacting security. While we are not advocates for making technology more difficult, we do advocate implementing common sense security policies and technologies that battle well-known and new threats. This report evaluates some of the most significant security liabilities that the enterprise is facing today. The report focuses on four key areas:

  • Increased Consumerization of Enterprise Computing
  • Prolonged and Persistent Targeting of Web Applications
  • Increased Organization and Sophistication of Attackers
  • The Unrelenting Presence of Legacy Threats

In addition to explaining how and where the enterprise is vulnerable, the report provides insights into how organizations can protect themselves from attack, including what the next generation of computing should look like to maximize security for the corporate network.

Additional Notes and Highlights

Expertise Required: Technology - Moderate