Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity
P. 1
2013ThreatsReport

2013ThreatsReport

Ratings: (0)|Views: 11 |Likes:
Symantec has established some of the most
comprehensive sources of Internet threat
data in the world through the Symantec™
Global Intelligence Network, which is made
up of approximately 69 million attack
sensors and records thousands of events
per second.
Symantec has established some of the most
comprehensive sources of Internet threat
data in the world through the Symantec™
Global Intelligence Network, which is made
up of approximately 69 million attack
sensors and records thousands of events
per second.

More info:

Categories:Types, Research
Published by: PartidulPiratRomania on Apr 22, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/22/2013

pdf

text

original

 
internet securitytHreAt rePOrt 2013
2012 Trends, Volume 18, Published April 2013
 
p. 3
Symantec Corporation
Internet Security Tret Report 2013 :: Volume 18
Introuction
Symantec has established some of the mostcomprehensive sources of Internet threatdata in the world through the Symantec™Global Intelligence Network, which is madeup of approximately 69 million attacksensors and records thousands of eventsper second. This network monitors threatactivity in over 157 countries and territoriesthrough a combination of Symantecproducts and services such as SymantecDeepSight™ Threat Management System,Symantec™ Managed Security Services andNorton™ consumer products, and otherthird-party data sources.
In addition, Symantec maintains one of the world’s mostcomprehensive vulnerability databases, currently consisting of more than 51,644 recorded vulnerabilities (spanning more thantwo decades) from over 16,687 vendors representing over 43,391products.Spam, phishing, and malware data is captured through a varietyof sources, including the Symantec Probe Network, a systemof more than 5 million decoy accounts; Symantec.cloud anda number of other Symantec security technologies. Skeptic™,the Symantec.cloud proprietary heuristic technology, is able todetect new and sophisticated targeted threats before reachingcustomers’ networks. Over 3 billion email messages and morethan 1.4 billion Web requests are processed each day across14 data centers. Symantec also gathers phishing informationthrough an extensive antifraud community of enterprises,security vendors, and more than 50 million consumers.Symantec Trust Services provides 100 percent availability andprocesses over 4.5 billion Online Certificate Status Protocol(OCSP) look-ups per day, which are used for obtaining therevocation status of X.509 digital certificates around the world.These resources give Symantec’s analysts unparalleled sourcesof data with which to identify, analyze, and provide informedcommentary on emerging trends in attacks, malicious codeactivity, phishing, and spam. The result is the annual SymantecInternet Security Threat Report, which gives enterprises, smallbusinesses, and consumers the essential information to securetheir systems effectively now and into the future.
SHARETHIS

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->