成人小说亚洲一区二区三区,亚洲国产精品一区二区三区,国产精品成人精品久久久,久久综合一区二区三区,精品无码av一区二区,国产一级a毛一级a看免费视频,欧洲uv免费在线区一二区,亚洲国产欧美中日韩成人综合视频,国产熟女一区二区三区五月婷小说,亚洲一区波多野结衣在线

立即打開
威瑞森:譴責(zé)網(wǎng)絡(luò)間諜活動(dòng)不能光盯著中國(guó)

威瑞森:譴責(zé)網(wǎng)絡(luò)間諜活動(dòng)不能光盯著中國(guó)

Michal Lev-Ram 2014年04月25日
威瑞森公司近日出臺(tái)的最新年度數(shù)據(jù)泄露報(bào)告詳細(xì)分析了2013年九種主要的攻擊形式。其中,涉及國(guó)家行為的未經(jīng)授權(quán)的網(wǎng)絡(luò)或系統(tǒng)訪問行為激增了三倍。但它警告稱,在這個(gè)問題上不能老是譴責(zé)中國(guó)?,F(xiàn)在有記錄的網(wǎng)絡(luò)間諜活動(dòng)中,超過1/5是從西歐國(guó)家發(fā)動(dòng)的。

????又是一年春來到,黑脈金斑蝶開始向北遷徙,威瑞森(Verizon)的數(shù)據(jù)泄露報(bào)告又出臺(tái)了,使全球各地已經(jīng)深陷恐慌的企業(yè)信息安全總監(jiān)們又恐慌了一次。

????威瑞森的年度報(bào)告調(diào)查分析了全球約50家企業(yè)的63000多起信息安全事件(以及1300多起已經(jīng)得到確認(rèn)的數(shù)據(jù)泄露事件)。今年這篇長(zhǎng)達(dá)60頁(yè)的報(bào)告一共歸納了九種攻擊模式,包括對(duì)零售終端的入侵、拒絕服務(wù)攻擊以及網(wǎng)絡(luò)間諜活動(dòng)等等。據(jù)威瑞森公司表示,在2013年發(fā)生的全部信息安全性事件中,有94%都可以歸入這九大類。

????下面我們將各大企業(yè)面臨的九大最緊迫的信息安全威脅簡(jiǎn)要總結(jié)如下:

????1. 網(wǎng)絡(luò)應(yīng)用襲擊

????它是數(shù)據(jù)泄露最常見的形式之一。據(jù)威瑞森公司的報(bào)告指出,網(wǎng)絡(luò)應(yīng)用依舊是“眾所周知的互聯(lián)網(wǎng)沙袋”。那么壞人們是怎樣發(fā)動(dòng)襲擊的?答案是通過釣魚技術(shù)、安裝惡意軟件,再就是猜中你們?cè)O(shè)置的那些過于簡(jiǎn)單的密保問題,比如你的第一個(gè)玩具娃娃叫什么名字、你表哥的眼睛是什么顏色、你六年級(jí)時(shí)的昵稱是什么。不過威瑞森也指出,現(xiàn)在已經(jīng)有了更好的方法來防范網(wǎng)絡(luò)應(yīng)用襲擊,第一步就是采用雙因子驗(yàn)證。

????2. 網(wǎng)絡(luò)間諜活動(dòng)

????2013年,與國(guó)家行為有關(guān)的未經(jīng)授權(quán)的網(wǎng)絡(luò)或系統(tǒng)訪問行為激增了三倍。威瑞森公司表示,網(wǎng)絡(luò)間諜活動(dòng)所展示出的“威脅舉動(dòng)”的方法超過了其它任何一種襲擊模式,發(fā)動(dòng)襲擊者一旦獲取了訪問權(quán)限,就會(huì)在系統(tǒng)中為所欲為,進(jìn)行從掃描整個(gè)網(wǎng)絡(luò)到輸出數(shù)據(jù)的各種活動(dòng)。威瑞森公司警告稱,我們?cè)谶@個(gè)問題上不能總是譴責(zé)中國(guó)——至少是不能光是譴責(zé)中國(guó)。有記錄的網(wǎng)絡(luò)間諜活動(dòng)中,現(xiàn)在約有21%是從西歐國(guó)家發(fā)動(dòng)的。

????3.?入侵零售終端

????最典型的例子就是最近塔吉特百貨(Target)數(shù)據(jù)泄露的案例,黑客侵入塔吉特百貨的系統(tǒng)之后,獲取了大約4000萬名顧客的信用卡號(hào)。入侵零售終端似乎已經(jīng)成了近期流行的一種襲擊方式。不過威瑞森公司指出,入侵零售終端系統(tǒng)的活動(dòng)與前幾年相比實(shí)際呈下降趨勢(shì)。這份報(bào)告的作者寫道:“最近被廣泛報(bào)道的幾家大型零售商的泄密事件把POS系統(tǒng)推到了風(fēng)口浪尖上,但是事實(shí)上,這個(gè)問題已經(jīng)存在好幾年了?!钡还茉鯓?,零售企業(yè)和酒店等還是要特別關(guān)注這種襲擊模式。只需要一次大型的零售終端入侵事件就足以嚇跑顧客和投資人——塔吉特百貨就是個(gè)活生生的例子。

????4. 支付卡套卡機(jī)

????盜刷支付卡的行為主要發(fā)生在ATM機(jī)和加油站,而且它是一種相對(duì)粗糙的入侵形式,需要一臺(tái)盜刷設(shè)備(即俗稱的“套卡機(jī)”)與機(jī)器進(jìn)行連接才能實(shí)現(xiàn)盜刷。這已經(jīng)不是什么新招術(shù)了,但是如今黑客收集被“盜刷”的卡片數(shù)據(jù)的方式卻又“花樣翻新”了。過去犯罪分子必須要親自回收“套卡機(jī)”,但現(xiàn)在他們可以利用藍(lán)牙或者其它無線通訊技術(shù)收集卡片的數(shù)據(jù)。雖然如今更加現(xiàn)代化的ATM機(jī)在設(shè)計(jì)上已經(jīng)可以抵御套卡盜刷,但是它在全球其他一些地方仍然是個(gè)大問題,比如保加利亞和亞美尼亞等國(guó)家。

????5. 內(nèi)部濫用

????光看標(biāo)題你可能還不清楚這部分講的是什么。大家可以想想斯諾登的爆料,或者任何未經(jīng)批準(zhǔn)而惡意使用一個(gè)組織的資源的例子。最常見的情況就是企業(yè)內(nèi)部員工利用明令禁止的設(shè)備(比如USB存儲(chǔ)設(shè)備)或服務(wù)把情報(bào)資源發(fā)送到他們自己的個(gè)人賬戶——又或者是假裝成另一名用戶發(fā)送信息,好讓某個(gè)同事被公司炒魷魚。據(jù)威瑞森公司表示,從事這些犯罪活動(dòng)的人中有很多是支付鏈上的人員或者終端用戶,但前幾年也有不少企業(yè)高管干這種事。教訓(xùn)是:不要相信任何人。

????6. 犯罪軟件

????這個(gè)類別包括除了間諜行為或入侵零售終端行為以外的任何惡意軟件事件。犯罪軟件的目的一定是為了進(jìn)行某種非法活動(dòng),比如竊取用戶的網(wǎng)絡(luò)銀行證書等。大多數(shù)惡意軟件都是從下載或者所謂的“偷渡式感染”開始的,也就是說病毒可能是在用戶不自覺地點(diǎn)擊了一個(gè)隱藏彈窗時(shí)被下載到了電腦上。那么企業(yè)應(yīng)該如何對(duì)抗這種類型的攻擊呢?首先要及時(shí)更新瀏覽器等軟件。

???

????It's that time of year again: Spring is in the air, Monarch butterflies are traveling north, and Verizon's (VZ) data breach report is making the rounds, freaking out already freaked-out chief information security officers around the globe.

????The annual report compiles and analyzes more than 63,000 security incidents (as well as 1,300 confirmed data breaches) from about 50 companies worldwide. This year's 60-page document identified nine main patterns of attack, including point-of-sale intrusions, denial-of-service attacks and acts of cyberespionage. According to Verizon, 94% of all security incidents in 2013 can be traced to these nine basic categories.

????(As for the other 6% of threats facing corporate America, well, ignorance is bliss, right?)

????Here, our summary of the most pressing security threats for major companies:

????1. Web app attacks

????Hands down, this is the most common type of data breach. According to Verizon's report, web applications remain the "proverbial punching bag of the Internet." How do the bad guys do it? Phishing techniques, installing malware, and, yes, correctly guessing the name of your firststuffed animal, your oldest cousin's eye color and your nickname in sixth grade. There are ways to better protect Internet-facing applications, Verizon insists, and it starts with two-factor authentication.

????2. Cyberespionage

????Incidents of unauthorized network or system access linked to state-affiliated actors have tripled -- that's right, tripled -- over the last year. Espionage exhibits a wider variety of "threat actions" than any other attack pattern, Verizon says, which means that once intruders gain access, they're making themselves comfortable and partaking in all sorts of activities, from scanning networks to exporting data. Verizon warns that we can't keep blaming China, though -- at least not just China. About 21% of reported incidents are now being instigated from Eastern Europe.

????3. Point-of-sale intrusions

????Given the recent high-profile Target (TGT) breach, in which hackers gained access to the credit card numbers of some 40 million customers, this may seem like the attack pattern du jour. But Verizon claims point-of-sale intrusions have actually been trending down over the last several years. "Recent highly publicized breaches of several large retailers have brought POS compromises to the forefront," the report's authors write. "But at the risk of getting all security-hipster on you -- we've been talking about this for years." Still, retailers and hotel companies in particular need to be concerned about this kind of attack. It only takes one massive point-of-sale intrusion to scare away customers and investors -- just ask Target.

????4. Payment card skimmers

????Skimming mainly affects ATMs and gas pumps, and is a relatively crude form of attack that requires a skimming device to be physically added to a machine. It's hardly a new tactic, but what's different today is the way that the data from "skimmed" payment cards is collected. Before, a criminal had to retrieve the skimming device; now, a thief can remotely collect the data using Bluetooth or other wireless technologies. More modern ATMs are designed to be relatively tamper-free, but this is still a big problem in some parts of the world, such as Bulgaria and Armenia.

????5. Insider misuse

????Not sure what falls under this category? Imagine someone akin to the rebel NSA defense contractor Edward Snowden, or pretty much any unapproved or malicious use of organizational resources. The most common examples of this are employees using forbidden devices (e.g. USB drives) or services to send intellectual property to their personal accounts -- or, more deliberately, posing as another user and sending messages aimed at getting a colleague fired. According to Verizon, many of the people committing these crimes are payment chain personnel and end users, but C-suite managers were more to blame in prior years. Bottom line: Trust no one.

????6. Crimeware

????This category includes any malware incident that doesn't fit into the espionage or point-of-sale buckets. The goal is always some kind of illicit activity, such as stealing users' online banking credentials. Most forms of crimeware start with web activity such as downloads or so-called drive-by infections, where a virus can be downloaded when a user unknowingly clicks on a deceptive pop-up window. What can corporations do to combat these types of attacks? Keep software such as browsers up to date.?

掃碼打開財(cái)富Plus App
国产成人精品亚洲午夜麻 | 精品卡通动漫在线观看视频一区| 亚洲日韩欧美明星在线观看| 中文字幕亚洲精品乱码| 亚洲国产一二三精品无码| 区在线观看亚洲欧洲日产国码aⅴ系列天堂| 亚洲AV最新天堂网址| 午夜精品一区二区三区在线观看| 在线看国产三级在线| 九九re热久久久久精品| 日韩精品无码中文字幕电影| 国产超薄肉色丝袜视频在线a| 久久亚洲精精品中文字幕| 欧美成人一区二区三区在线视频| 色AV永久无码影院AV| 日韩AⅤ无码AV一区二区三区| 亚洲精品无码精品MV在线观看| 国产高清在线精品二区| 中文人妻无码一区二区三区信息| 国产成人无码一区二区三区| 亚洲ⅴ国产v天堂a无码二区| 亚洲欧洲日产国码无码久久99| 在线观看午夜亚洲一区| 亚洲伊人情人综合网站 | 国产呦精品一区二区三区网站| 国产亚洲精品高清在线| 久久久精品人妻一区亚美研究所| 一区二区三区动漫成人在线观看| 日韩一区二区精品蜜桃视频| 亚洲AV永久无码精品一百度影院| 天天搞夜夜爽aaaaa级毛片免费视频| 永久免费精品精品永久夜色| 丰满迷人的少妇特级毛片| 久久精品成人亚洲另类| 亚洲AV日韩AV一区二区三曲| 人妻少妇久久中文字幕| 国产午夜精品视频一区二区三区| 91麻豆精品国产高清在线| 成人H动漫精品一区二区| 中文字幕乱码二区免费| 亚洲已满18点击进入在线看片|