Symantec Global Internet Security Threat Report: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 6: Line 6:


[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Symantec:2010&f=wikibiblio.bib BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/?title=Special:Bibliography&view=detailed&startkey=Symantec:2010&f=wikibiblio.bib BibTeX]


==Categorization==
==Categorization==
Line 14: Line 13:
==Key Words==  
==Key Words==  


 
Symantec, virus, cybercrime, phishing, honeypot, malicious code, spam, attacks, security, hacker


==Synopsis==
==Synopsis==

Revision as of 17:03, 3 June 2010

Symantec Global Internet Security Threat Report: Trends for 2009

Full Citation

Symantec Corporation (2010): Symantec Global Internet Security Threat Report: Trends for 2009. Online Paper. Web

BibTeX

Categorization

Overview: Industry Reports

Key Words

Symantec, virus, cybercrime, phishing, honeypot, malicious code, spam, attacks, security, hacker

Synopsis

Symantec gathers malicious code intelligence from more than 133 million client, server, and gateway systems that have deployed its antivirus products. Additionally, Symantec’s distributed honeypot network collects data from around the globe, capturing previously unseen threats and attacks and providing valuable insight into attacker methods.

Spam and phishing data is captured through a variety of sources including: the Symantec Probe Network, a system of more than 5 million decoy accounts; MessageLabs Intelligence, a respected source of data and analysis for messaging security issues, trends and statistics; and other Symantec technologies. Data is collected in more than 86 countries. Over 8 billion email messages, as well as over 1 billion Web requests, are processed per day across 16 data centers. Symantec also gathers phishing information through an extensive antifraud community of enterprises, security vendors and more than 50 million consumers.

These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the Symantec Global Internet Security Threat Report, which gives enterprises and consumers essential information to effectively secure their systems now and into the future

Additional Notes and Highlights

Executive Summary