пр аналитика по утечкам информации (Data breach) часть 2 2014 04

6,870 views

Published on

Published in: Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total views
6,870
On SlideShare
0
From Embeds
0
Number of Embeds
6,130
Actions
Shares
0
Downloads
45
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

пр аналитика по утечкам информации (Data breach) часть 2 2014 04

  1. 1. Зарубежная аналитика по утечками информации (data breach) часть 2 2014-04 Прозоров Андрей, блог «Жизнь 80 на 20» http://80na20.blogspot.ru Твиттер: @3dwave
  2. 2. Источники
  3. 3. Vormetric (+Enterprise Strategy Group) • Методология: анкетирование / опросы • http://www.vormetric.com • Отчеты: – «The 2013 Vormetric Insider Threat Report» 2013-10 [1.1]
  4. 4. insider threats - threats posed by employees, third parties, or malicious software that uses legitimate access rights to networks, applications, and sensitive data as an attack vector [1.1]
  5. 5. [1.1]
  6. 6. [1.1]
  7. 7. [1.1]
  8. 8. [1.1]
  9. 9. [1.1]
  10. 10. [1.1]
  11. 11. [1.1]
  12. 12. + отчет Symantec + отчет PWC + Verizon +может CISCO http://www.verizonenterprise.com/DBIR/2014 /reports/rp_Verizon-DBIR-2014_en_xg.pdf
  13. 13. Verizon • Отчеты ведут с 2008 • http://www.verizonenterprise.com • Методология: анализ инцидентов ИБ, предоставляемых внешними организациями (CERT, Australian Federal Police, Dutch Police и пр.) • Отчеты: – «2014 Data Breach Investigations report» [2.1]
  14. 14. [2.1]
  15. 15. [2.1]
  16. 16. [2.1]
  17. 17. Top 20 varieties of threat actions over time [2.1]
  18. 18. [2.1]
  19. 19. [2.1]
  20. 20. [2.1]
  21. 21. [2.1]
  22. 22. [2.1]
  23. 23. [2.1]
  24. 24. [2.1]
  25. 25. [2.1]
  26. 26. [2.1]
  27. 27. [2.1]
  28. 28. [2.1]
  29. 29. [2.1]
  30. 30. [2.1]
  31. 31. [2.1]
  32. 32. [2.1]
  33. 33. [2.1]
  34. 34. [2.1]
  35. 35. [2.1]
  36. 36. [2.1]
  37. 37. [2.1]
  38. 38. [2.1]
  39. 39. [2.1]
  40. 40. [2.1]
  41. 41. [2.1]
  42. 42. [2.1]
  43. 43. [2.1]
  44. 44. [2.1]
  45. 45. [2.1]
  46. 46. [2.1]
  47. 47. [2.1]
  48. 48. Symantec • Методология: мониторинг СМИ • http://www.symantec.com • Отчеты: – «2014 Internet Security Threat Report, Volume 19» [3.1]
  49. 49. [2.1]
  50. 50. [2.1]
  51. 51. [2.1]
  52. 52. [2.1]
  53. 53. [2.1]
  54. 54. [2.1]
  55. 55. PwC • Методология: анкетирование / опросы • http://www.pwc.com • Отчеты: – «На правильном пути. Российский озор экономических преступлений за 2014 год» [4.1] Не совсем про утечки, но тема смежная…
  56. 56. [4.1]
  57. 57. [4.1]
  58. 58. [4.1]
  59. 59. [4.1]
  60. 60. [4.1]
  61. 61. [4.1]
  62. 62. [4.1]
  63. 63. [4.1]
  64. 64. [4.1]
  65. 65. TrendMicro • Методология: мониторинг СМИ • www.trendmicro.com • Отчеты: – «Cashing in on Digital Information. An Onslaught of Online Banking Malwareand Ransomware» 2014 [5.1]
  66. 66. [5.1]
  67. 67. Прозоров Андрей, блог «Жизнь 80 на 20» http://80na20.blogspot.ru Твиттер: @3dwave

×