Professional Documents
Culture Documents
Top 15 Cyber Threats 2015 (ENISA)
Top 15 Cyber Threats 2015 (ENISA)
TREND 2015
In ke
rs
TREND 2015
s
Na
al
in
tio
3
s
o
rim
s s o c i a ln l i n e o
s o c i a ln l i n e
ider
s
n/
hac ider hac
Ins ke
rs Ins ke
rs
Na
TREND 2015
TREND 2015
al
rc
1
Sta
s s
Na
al
Na
al
in
ti
13
in
ti
in
14
tio
on
Cybe
rim
on
rim
t es
/S
rc
/S
rc
tat
rim
tat
Cybe
Cybe
es
n/
es
i ons
Sc ri p t k idd
i ons
Sc ri pt k idd
rc
porat
Sta
por at
Ransomware
ions
Information
Script kidd
Co r
i es
Cybe
Co r
leakage
i es
t es
Cy
be
p o r at
s
te i
st
r
iv
Cy
rr
kt
be
or
s
te c
vi Ha
st
ist
r
rr i s
or c kt C yb er F i g h t e rs
Web application
ist
s Ha
C y b e r F i g h t e rs
Co r
attacks
i es
ions
Script kidd
Cy
be
ts
te
p o r at
r
v
is
rr i
or kt
Malware
c
ist
s Ha
C y b e r F i g h t e rs
Cor
ies
o
s s o c i a ln l i n e
ider hac
Ins ke
rs
Na
al
6
in
ti
Cy
on
rim
/S
be
rc
ts
tat
te
Cybe
r
v
is
es
rr t
or c k
ist H a
ions
Script kidd
TREND 2015
ider
s
o
s o c i a ln l i n e s
p o r at
hac
Ins ke
rs
C y b e r F i g h t e rs Physical damage / ider
s
o
s o c i a ln l i n e
hac
s Ins ke
theft / loss
Co r
rs
Na
i es
TREND 2015
al
in
ti
9
on
rim
s
/S
rc
Na
al
7
tat
in
ti
Cybe
Cy
on
es
rim
be
ts
te
/S
r
iv
is
rc
rr t
tat
or ck
Cybe
ions
Script kidd
ist Ha
es
s
p o r at
C y b e r F i g h t e rs
Spam
Co r
ions
Script kidd
i es
p o r at
o
s o c i a ln l i n e
Insider
s
ider hac
TREND 2015
Cy
Ins ke
rs
be
ts
te
r
iv
is
rr
threat
Co r
s
kt
i es
or
Na
c
al
ist Ha
in
ti
12
s
o
on
rim
s o c i a ln l i n e
C y b e r F i g h t e rs
/S
rc
tat
s
Cybe
er hac
es
Cy
i d
ns
be
ts
I ke te
r
v
is
rr ti
rs
i ons
Sc ri pt k idd
TREND 2015
k
TREND 2015
or
ist ac
por at
s H
Identity theft C y b e r F i g h t e rs
Co r
i es
s
Cy
Na
al
be
te vi
st
r
rr ti
or ck
in
tio
ist Ha
2
s
C y b e r F i g h t e rs
rim
n/
o
s o c i a ln l i n e
rc
e rs
Sta
id hac
Ins ke
rs
Cybe
s t es
Na
al
in
ti
4
on
rim
/S
rc
ions
Script kidd
o
s o c i a ln l i n e
tat
s
ider hac
Cybe
In s ke
rs
TREND 2015
es
s
Na
al
15
in
ti
p o r at
on
rim
/S
rc
tat
Cybe
es
Web-based
ions
Script kidd
i ons
Sc ri p t k idd
porat
Cyber
Cor
p o r at
attacks
ies
espionage
Co r
i es
o
s o c i a ln l i n e
Botnets
er s hac
sid
Cy
In ke
be
te i
st
rs
r
rr ti v
Co r
or ck
ist Ha
i es
s
C yb er F i ght ers
s
Na
al
Cy
in
ti
8 on
rim
be
/S
ts
rc
Cy
TREND 2015
te
tat
r
Cybe
v
is
be
ts
rr i
es
te
t
r
v
is
rr ti or k
or c k
ist a c
ist Ha H
ions
Script kidd
s o s TREND 2015
C y b e r F i g h t e rs s s o c i a ln l i n e
p o r at
s i der hac
C y b e r F i g h t e rs
I n ke
rs Phishing
TREND 2015
Co r
i es
s
Na
al
Cy
5
in
ti
be
ts
on
te
rim
iv
is
rr t
or ck
/S
Ha
rc
ist
s
tat
C y b e r F i g h t e rs
Cybe
es
o o
s s o c i a ln l i n e s s o c i a ln l i n e
Ins
ider hac ider hac
ke
rs Ins ke
rs
TREND 2015
s s
Na
al
Na
ions
al
Script kidd
in
ti
in
ti
11
on
rim
10
on
rim
/S
rc
/S
rc
tat
p o r at
Cybe
tat
Cybe
es
es
Denial of
ions
Scri pt k idd
Co r
TREND 2015
service
i es
ions
Scri pt kidd
porat
por at
Data breaches
Co r
i es
Exploit kits
Co r
i es
Cy
be
Cy
ts
te
be
ts
te
r
iv
is
r
v
is
rr ti
Cy
or
ac
k rr t
be
ck
ts
i st H or te
r
s iv
is
Ha
rr
C y b e r F i g h t e rs ist or c kt
s ist
s Ha
C y b e r F i g h t e rs C y b e r F i g h t e rs
2013 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Trend
TOP Drive by Worms / Code Exploit kits Botnets Physical Identity Denial of Phishing Spam Ransomware / Data Information Targeted Watering
downloads Trojans Injection damage / theft / service Rogueware / breaches leakage Attacks Hole
15 theft / fraud Scareware
loss