找回密码
 快速注册

扫描二维码登录本站

手机号码,快捷登录

投行业服务、产品的撮合及交易! “投行先锋客户端” - 投行求职
      “项目”撮合 - 投行招聘

投行先锋VIP会员的开通及说明。 无限下载,轻松学习,共建论坛. 购买VIP会员 - 下载数量和升级

“投行先锋论坛会员必知和报到帖” 帮助您学习网站的规则和使用方法。 删帖密码积分先锋币评分

查看: 516|回复: 0

[信息传输、计算机服务和软件业] 赛门铁克:2014年全球互联网安全报告(二)

[复制链接]
最佳答案
0 
发表于 2014-7-18 11:21:43 | 显示全部楼层 |阅读模式
5 APPENDIX :: A
THREAT ACTIVITY TRENDS
6 Threat Activity Trends
7 Malicious Activity by Source
8 Malicious Activity by Source:
Overall Rankings, 2012–2013
8 Malicious Activity by Source:
Malicious Code, 2012–2013
9 Malicious Activity by Source:
Phishing Hosts, 2012–2013
9 Malicious Activity by Source:
Spam Zombies, 2012–2013
10 Malicious Activity by Source:
Web Attack Origins, 2012–2013
10 Malicious Activity by Source:
Bots, 2012–2013
11 Malicious Activity by Source:
Network Attack Origins, 2012–2013
12 Malicious Web-Based Attack Prevalence
12 Malicious Website Activity, 2012–2013
14 Analysis of Malicious Web Activity
by Attack Toolkits
14 Malicious Website Activity:
Attack Toolkit Trends
15 Malicious Website Activity:
Overall Frequency of Major Attack Toolkits
16 Analysis of Web-Based Spyware, Adware,
and Potentially Unwanted Programs
16 Potentially Unwanted Programs:
Spyware and Adware Blocked
17 Analysis of Web Policy Risks
from Inappropriate Use
17 Web Policies that Triggered Blocks, 2012–2013
19 Analysis of Website Categories Exploited
to Deliver Malicious Code
19 Malicious Web Activity:
Categories that Delivered Malicious Code
20 Malicious Web Activity:
Malicious Code By Number of Infections per Site
for Top-Five Most Frequently Exploited Categories
20 Malicious Web Activity:
Malicious Code by Number of Infections per Site
21 Malicious Web Activity: Fake Antivirus by Category
22 Malicious Web Activity: Browser Exploits by Category
23 Malicious Web Activity: Social Networking Attacks by Category
24 Bot-Infected Computers
24 Top-Ten Bot Locations by Average Lifespan
of Bot, 2012–2013
26 Denial of Service Attacks
30 Analysis of Mobile Threats
30 Android Mobile Threats:
Newly Discovered Malicious Code, 2012–2013
31 Mobile Threats: Malicious Code by Platform, 2013
31 Android Mobile Threats:
Average Number of Malware Variants
per Family, 2012–2013
32 Mobile Threats:
Malicious Code Actions in Malware, 2012–2013
32 Mobile Threats:
Malicious Code Actions – Additional Detail, 2012–2013
33 Mobile Threats:
Documented Mobile Vulnerabilities by Platform
33 Mobile Threats:
Documented Mobile Vulnerabilities by Month
36 Quantified Self – A Path to Self-Enlightenment
or Just Another Security Nightmare?
37 Data Breaches that could lead to Identity Theft
38 Timeline of Data Breaches
Showing Identities Breached in 2013, Global
39 Data Breach Incidents by Sector
40 Identities Exposed by Sector
41 Average Number of Identities Exposed
per Data Breach by Notable Sector
42 Top Causes for Data Breach by Number of Breaches
42 Top Causes for Data Breaches
by Number of Identities Exposed
43 Types of Information Exposed by Data Breach
43 Average Number of Identities Exposed
per Data Breach, by Cause
44 Threat of the Insider
45 Gaming Attacks
46 The New Black Market
48 Footnotes
49 APPENDIX :: B
MALICIOUS CODE TRENDS
50 Malicious Code Trends
51 Top Malicious Code Families
52 Overall Top Malicious Code Families
53 Relative Proportion of Top-Ten Malicious Code Blocked
in Email Traffic by Symantec.cloud in 2013,
by Percentage and Ratio
53 Malicious Code Blocked in Email Traffic
by Symantec.cloud, 2012–2013
54 Relative Proportion of Top-Ten Malicious Code Blocked
in Web Traffic by Symantec.cloud in 2013,
by Percentage and Ratio
56 Analysis of Malicious Code Activity
by Geography, Industry Sector, and Company Size
57 Proportion of Email Traffic Identified as Malicious
by Industry Sector
57 Proportion of Email Traffic Identified as Malicious
by Organization Size
58 Propagation Mechanisms
58 Propagation Mechanisms
60 Email-Targeted Spear-Phishing Attacks Intelligence
68 Miniduke Sample of Email Subjects, Documents, and MD5s
71 Elderwood Sample of Email Subjects,
Documents, and MD5s
74 APT1 Sample of Email Subjects, Documents, and MD5s
76 Footnotes
77 APPENDIX :: C
SPAM + FRAUD
ACTIVITY TRENDS
78 Spam and Fraud Activity Trends
79 Analysis of Spam Activity Trends
79 Global Spam Volume in Circulation
80 Proportion of Email Traffic Identified as Spam, 2012–2013
81 Analysis of Spam Activity by Geography,
Industry Sector, and Company Size
81 Proportion of Email Traffic Identified as Spam
by Industry Sector
82 Proportion of Email Traffic Identified as Spam
by Organization Size
82 Proportion of Email Traffic Identified as Spam
by Geographic Location
83 Analysis of Spam Delivered by Botnets
83 Top Sources of Botnet Spam by Location
84 Analysis of Spam-Sending Botnet Activity
at the End of 2013
85 Significant Spam Tactics
85 Frequency of Spam Messages by Size
85 Proportion of Spam Messages Containing URLs
86 Analysis of Top-Level Domains Used in Spam URLs
87 Analysis of Spam by Categorization
88 Spam by Category
89 Phishing Activity Trends
89 Phishing Rate, 2012–2013
90 Phishing Category Types, Top 200 Organizations
90 Tactics of Phishing Distribution
92 Analysis of Phishing Activity by Geography,
Industry Sector, and Company Size
92 Proportion of Email Traffic Identified as Phishing
by Industry Sector
92 Proportion of Email Traffic Identified as Phishing
by Organization Size
93 Proportion of Email Traffic Identified as Phishing
by Geographic Location
94 New Spam Trend: BGP Hijacking
99 Footnotes
100 APPENDIX :: D
VULNERABILITY TRENDS
101 Vulnerability Trends
102 Total Number of Vulnerabilities
102 Total Vulnerabilities Identified 2006–2013
103 New Vulnerabilities Month-by-Month, 2012–2013
103 Most Frequently Attacked Vulnerabilities
105 Zero-Day Vulnerabilities
105 Volume of Zero-Day Vulnerabilities, 2006–2013
106 Zero-Day Vulnerabilities Identified
108 Web Browser Vulnerabilities
108 Browser Vulnerabilities, 2011–2013
109 Web Browser Plug-in Vulnerabilities
109 Browser Plug-In Vulnerabilities, 2012–2013
111 Web Attack Toolkits
112 SCADA Vulnerabilities
112 SCADA Vulnerabilities Identified
114 Footnotes
115 About Symantec
115 More Information

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?快速注册

×
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

在线客服

法律及免责声明|服务协议及隐私条款|手机版|投行先锋 ( 陕ICP备16011893号-1 )

GMT+8, 2024-11-28 10:02 , Processed in 0.263090 second(s), 28 queries , Gzip On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表