Đang chuẩn bị liên kết để tải về tài liệu:
Security Threat Report 2012

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Network scanning involves using a port scanner to identify all hosts potentially connected to an organization's network, the network services operating on those hosts, such as the file transfer protocol (FTP) and hypertext transfer protocol (HTTP), and the specific application running the identified service, such as WU-FTPD, Internet Information Server (IIS) and Apache for the HTTP service. The result of the scan is a comprehensive list of all active hosts and services, printers, switches, and routers operating in the address space scanned by the port-scanning tool, i.e., any device that has a network address or is accessible to any. | SOPHOS simple secure Security Threat Report 2012 Seeing the Threats Through the Hype Table of contents Foreword 1 2011 in review Hype about hacktivism.2 Under attack.4 Hacktivism takes center stage.4 Protection strategies for hacktivism .4 Data theft and loss. 5 Conficker remains widespread despite patch.6 Malware. 6 Protection strategies for malware . 6 The fall of fake antivirus.7 Targeted and stealth attacks are not just for defense contractors.7 Botnet takedowns momentarily knock out spam.8 Origins of spam. 9 Protection strategies for phishing and spam. 9 Videos d Beth Jones of SophosLabs explains malware 6 Mark Harris of SophosLabs explains fake antivirus 7 Principal Researcher Fraser Howard explains web vulnerabilities . . . . . 11 Richard Wang of SophosLabs explains OS vulnerabilities . 14 Director of Technology Strategy James Lyne explains mobile security 18 CTO Gerhard Eschelbeck explains cloud security 20 Graham Cluley of NakedSecurity.sophos.com explains social networking threats . 23 Senior Security Advisor Chester Wisniewski goes inside the latest web threats . 24 Online threats.10 Anatomy of an attack Drive-by downloads and Blackhole .11 How Blackhole works. 11 Stat snapshot How web threats spread. 12 Protection strategies for Blackhole . 12 Protecting against network threats Secure gateways.13 Protection strategies for networks. 13 Systems and software threats.14 Operating systems The rise of Mac malware.14 Protection strategies for operating systems. 14 Software patching More than Microsoft.15 Protection strategies for software. 15 Removable media Preventable data loss.16 6 tips to mitigate risk of data loss . 16 Protection strategies for removable media. 16 Risk in the way we work.17 Consumerization of IT.17 Mobile malware. 18 Protection strategies for mobile devices. 18 Mobile operating system security. 19 Mobile data loss case study Healthcare. 20 Cloud computing.20 Cloud insecurity. 20 Leaks from the cloud. 21 Protection strategies for cloud .