Upload
suki
View
22
Download
2
Embed Size (px)
DESCRIPTION
Figure 1.Distribution Of Attacks Targeting Web Browsers. Figure 2. Window Of Exposure, Enterprise Vendors. Figure 3. Operating System Window Of Exposure. Figure 4. Web Browsers Window Of Exposure. Figure 5. Web Browser Vulnerabilities. Figure 6. Active Bot Network Computers Per Day. - PowerPoint PPT Presentation
Citation preview
1Internet Security Threat Report X
Internet Security Threat Report VI
Figure 1.Distribution Of Attacks Targeting Web Browsers
2Internet Security Threat Report X
Internet Security Threat Report VI
Figure 2. Window Of Exposure, Enterprise Vendors
3Internet Security Threat Report X
Internet Security Threat Report VI
Figure 3. Operating System Window Of Exposure
4Internet Security Threat Report X
Internet Security Threat Report VI
Figure 4. Web Browsers Window Of Exposure
5Internet Security Threat Report X
Internet Security Threat Report VI
Figure 5. Web Browser Vulnerabilities
6Internet Security Threat Report X
Internet Security Threat Report VI
Figure 6. Active Bot Network Computers Per Day
7Internet Security Threat Report X
Internet Security Threat Report VI
Figure 7. Number Of Unique Phishing Messages
8Internet Security Threat Report X
Internet Security Threat Report VI
Figure 8. Phishing Activity By Sector
9Internet Security Threat Report X
Internet Security Threat Report VI
Figure 9. Distribution of Attacks Targeting Web Browsers
10Internet Security Threat Report X
Internet Security Threat Report VI
Figure 10. Denial Of Service Attacks Per Day
11Internet Security Threat Report X
Internet Security Threat Report VI
Figure 11. Top Countries Targeted By Denial Of Service Attacks
12Internet Security Threat Report X
Internet Security Threat Report VI
Figure 12. Active Bot Network Computers Per Day
13Internet Security Threat Report X
Internet Security Threat Report VI
Figure 13. Top Countries By Bot-Infected Computers
14Internet Security Threat Report X
Internet Security Threat Report VI
Figure 14. Distribution Of Command-And-Control Servers
15Internet Security Threat Report X
Internet Security Threat Report VI
Figure 15. Top Originating Countries
16Internet Security Threat Report X
Internet Security Threat Report VI
Figure 16. Total Volume Of Vulnerabilities
17Internet Security Threat Report X
Internet Security Threat Report VI
Figure 17. Web Application Vulnerabilities
18Internet Security Threat Report X
Internet Security Threat Report VI
Figure 18. Easily Exploitable Vulnerabilities
19Internet Security Threat Report X
Internet Security Threat Report VI
Figure 19. Easily Exploitable Vulnerabilities By Type
20Internet Security Threat Report X
Internet Security Threat Report VI
Figure 20. Window Of Exposure, Enterprise Vendors
21Internet Security Threat Report X
Internet Security Threat Report VI
Figure 21. Operating System Exploit Development Time
22Internet Security Threat Report X
Internet Security Threat Report VI
Figure 22. Operating System Patch Development Time
23Internet Security Threat Report X
Internet Security Threat Report VI
Figure 23. Operating System Window Of Exposure
24Internet Security Threat Report X
Internet Security Threat Report VI
Figure 24. Patch Development Time, Web Browsers
25Internet Security Threat Report X
Internet Security Threat Report VI
Figure 25. Window Of Exposure, Web Browsers
26Internet Security Threat Report X
Internet Security Threat Report VI
Figure 26. Web Browser Vulnerabilities
27Internet Security Threat Report X
Internet Security Threat Report VI
Figure 27. Exploit Code Release Period
28Internet Security Threat Report X
Internet Security Threat Report VI
Figure 28. Previously Unseen Threats As A Proportion Of All Threats
29Internet Security Threat Report X
Internet Security Threat Report VI
Figure 29. Malicious Code Types By Volume
30Internet Security Threat Report X
Internet Security Threat Report VI
Figure 30. New Win32 Virus And Worm Variants
31Internet Security Threat Report X
Internet Security Threat Report VI
Figure 31. Volume Of Bots Reported
32Internet Security Threat Report X
Internet Security Threat Report VI
Figure 32. Exposure Of Confidential Information
33Internet Security Threat Report X
Internet Security Threat Report VI
Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol
34Internet Security Threat Report X
Internet Security Threat Report VI
Figure 34. Volume Of Modular Malicious Code
35Internet Security Threat Report X
Internet Security Threat Report VI
Figure 35. Modular Malicious Code Samples
36Internet Security Threat Report X
Internet Security Threat Report VI
Figure 36. Malicious Code Propagation Vectors
37Internet Security Threat Report X
Internet Security Threat Report VI
Figure 37. Number Of Unique Phishing Messages
38Internet Security Threat Report X
Internet Security Threat Report VI
Figure 38. Blocked Phishing Attempts
39Internet Security Threat Report X
Internet Security Threat Report VI
Figure 39. Phishing Activity By Sector
40Internet Security Threat Report X
Internet Security Threat Report VI
Figure 40. Spam Categories
41Internet Security Threat Report X
Internet Security Threat Report VI
Figure 41. Top Ten Countries Of Spam Origin
42Internet Security Threat Report X
Internet Security Threat Report VI
Figure 42. Spam Containing Malicious Code
43Internet Security Threat Report X
Internet Security Threat Report VI
Figure 43. Industry Representational Breakdown
44Internet Security Threat Report X
Internet Security Threat Report VI
Table 1. TopTargetedSector
45Internet Security Threat Report X
Internet Security Threat Report VI
Table 2. TopSectDoSAtks
46Internet Security Threat Report X
Internet Security Threat Report VI
Table 3. TopWebBrwsrAttacks
47Internet Security Threat Report X
Internet Security Threat Report VI
Table 4. TopAttacksWireless
48Internet Security Threat Report X
Internet Security Threat Report VI
Table 5. TopSectDoSAtks
49Internet Security Threat Report X
Internet Security Threat Report VI
Table 6. TopBotNetworkCities
50Internet Security Threat Report X
Internet Security Threat Report VI
Table 7. TopTargetedSector
51Internet Security Threat Report X
Internet Security Threat Report VI
Table 8. TopNewMalCodeFam
52Internet Security Threat Report X
Internet Security Threat Report VI
Table 10. Top10CountSpamOrg
53Internet Security Threat Report X
Internet Security Threat Report VI
Table 11. TopNewSecurRisks
54Internet Security Threat Report X
Internet Security Threat Report VI
Table 12. Anti-removalTechs
55Internet Security Threat Report X
Internet Security Threat Report VI
Table 13. Self-updatSecur
56Internet Security Threat Report X
Internet Security Threat Report VI
Table 14. TopSecurityRisks