Download presentation
Presentation is loading. Please wait.
Published byAlban Randall Modified over 9 years ago
1
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers
2
2 Internet Security Threat Report X Internet Security Threat Report VI Figure 2. Window Of Exposure, Enterprise Vendors
3
3 Internet Security Threat Report X Internet Security Threat Report VI Figure 3. Operating System Window Of Exposure
4
4 Internet Security Threat Report X Internet Security Threat Report VI Figure 4. Web Browsers Window Of Exposure
5
5 Internet Security Threat Report X Internet Security Threat Report VI Figure 5. Web Browser Vulnerabilities
6
6 Internet Security Threat Report X Internet Security Threat Report VI Figure 6. Active Bot Network Computers Per Day
7
7 Internet Security Threat Report X Internet Security Threat Report VI Figure 7. Number Of Unique Phishing Messages
8
8 Internet Security Threat Report X Internet Security Threat Report VI Figure 8. Phishing Activity By Sector
9
9 Internet Security Threat Report X Internet Security Threat Report VI Figure 9. Distribution of Attacks Targeting Web Browsers
10
10 Internet Security Threat Report X Internet Security Threat Report VI Figure 10. Denial Of Service Attacks Per Day
11
11 Internet Security Threat Report X Internet Security Threat Report VI Figure 11. Top Countries Targeted By Denial Of Service Attacks
12
12 Internet Security Threat Report X Internet Security Threat Report VI Figure 12. Active Bot Network Computers Per Day
13
13 Internet Security Threat Report X Internet Security Threat Report VI Figure 13. Top Countries By Bot-Infected Computers
14
14 Internet Security Threat Report X Internet Security Threat Report VI Figure 14. Distribution Of Command-And-Control Servers
15
15 Internet Security Threat Report X Internet Security Threat Report VI Figure 15. Top Originating Countries
16
16 Internet Security Threat Report X Internet Security Threat Report VI Figure 16. Total Volume Of Vulnerabilities
17
17 Internet Security Threat Report X Internet Security Threat Report VI Figure 17. Web Application Vulnerabilities
18
18 Internet Security Threat Report X Internet Security Threat Report VI Figure 18. Easily Exploitable Vulnerabilities
19
19 Internet Security Threat Report X Internet Security Threat Report VI Figure 19. Easily Exploitable Vulnerabilities By Type
20
20 Internet Security Threat Report X Internet Security Threat Report VI Figure 20. Window Of Exposure, Enterprise Vendors
21
21 Internet Security Threat Report X Internet Security Threat Report VI Figure 21. Operating System Exploit Development Time
22
22 Internet Security Threat Report X Internet Security Threat Report VI Figure 22. Operating System Patch Development Time
23
23 Internet Security Threat Report X Internet Security Threat Report VI Figure 23. Operating System Window Of Exposure
24
24 Internet Security Threat Report X Internet Security Threat Report VI Figure 24. Patch Development Time, Web Browsers
25
25 Internet Security Threat Report X Internet Security Threat Report VI Figure 25. Window Of Exposure, Web Browsers
26
26 Internet Security Threat Report X Internet Security Threat Report VI Figure 26. Web Browser Vulnerabilities
27
27 Internet Security Threat Report X Internet Security Threat Report VI Figure 27. Exploit Code Release Period
28
28 Internet Security Threat Report X Internet Security Threat Report VI Figure 28. Previously Unseen Threats As A Proportion Of All Threats
29
29 Internet Security Threat Report X Internet Security Threat Report VI Figure 29. Malicious Code Types By Volume
30
30 Internet Security Threat Report X Internet Security Threat Report VI Figure 30. New Win32 Virus And Worm Variants
31
31 Internet Security Threat Report X Internet Security Threat Report VI Figure 31. Volume Of Bots Reported
32
32 Internet Security Threat Report X Internet Security Threat Report VI Figure 32. Exposure Of Confidential Information
33
33 Internet Security Threat Report X Internet Security Threat Report VI Figure 33. Percentage Of Instant Messaging Threat Propagation By Protocol
34
34 Internet Security Threat Report X Internet Security Threat Report VI Figure 34. Volume Of Modular Malicious Code
35
35 Internet Security Threat Report X Internet Security Threat Report VI Figure 35. Modular Malicious Code Samples
36
36 Internet Security Threat Report X Internet Security Threat Report VI Figure 36. Malicious Code Propagation Vectors
37
37 Internet Security Threat Report X Internet Security Threat Report VI Figure 37. Number Of Unique Phishing Messages
38
38 Internet Security Threat Report X Internet Security Threat Report VI Figure 38. Blocked Phishing Attempts
39
39 Internet Security Threat Report X Internet Security Threat Report VI Figure 39. Phishing Activity By Sector
40
40 Internet Security Threat Report X Internet Security Threat Report VI Figure 40. Spam Categories
41
41 Internet Security Threat Report X Internet Security Threat Report VI Figure 41. Top Ten Countries Of Spam Origin
42
42 Internet Security Threat Report X Internet Security Threat Report VI Figure 42. Spam Containing Malicious Code
43
43 Internet Security Threat Report X Internet Security Threat Report VI Figure 43. Industry Representational Breakdown
44
44 Internet Security Threat Report X Internet Security Threat Report VI Table 1. TopTargetedSector
45
45 Internet Security Threat Report X Internet Security Threat Report VI Table 2. TopSectDoSAtks
46
46 Internet Security Threat Report X Internet Security Threat Report VI Table 3. TopWebBrwsrAttacks
47
47 Internet Security Threat Report X Internet Security Threat Report VI Table 4. TopAttacksWireless
48
48 Internet Security Threat Report X Internet Security Threat Report VI Table 5. TopSectDoSAtks
49
49 Internet Security Threat Report X Internet Security Threat Report VI Table 6. TopBotNetworkCities
50
50 Internet Security Threat Report X Internet Security Threat Report VI Table 7. TopTargetedSector
51
51 Internet Security Threat Report X Internet Security Threat Report VI Table 8. TopNewMalCodeFam
52
52 Internet Security Threat Report X Internet Security Threat Report VI Table 10. Top10CountSpamOrg
53
53 Internet Security Threat Report X Internet Security Threat Report VI Table 11. TopNewSecurRisks
54
54 Internet Security Threat Report X Internet Security Threat Report VI Table 12. Anti-removalTechs
55
55 Internet Security Threat Report X Internet Security Threat Report VI Table 13. Self-updatSecur
56
56 Internet Security Threat Report X Internet Security Threat Report VI Table 14. TopSecurityRisks
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.