WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

ENISA reports on Cyber Threat Landscape

The EU’s cyber security agency ENISA has published a comprehensive document summarising over 120 2011 and 2012 threat reports. The Cyber Threat Landscape report provides an independent overview of observed threats and threat agents together with the current top threats, and emerging threats trends.

The Threat Landscape report also analyses the ‘cyber enemy’: identifying and listing the top ten (out of a total of sixteen) threats in emerging technology areas. The areas considered are mobile computing, social media/technology, critical infrastructure, trust infrastructures, cloud, and big data.

The identified top ten threats are:

1. Drive-by exploits (malicious code injects to exploit web browser vulnerabilities)
2. Worms/trojans
3. Code injection attacks
4. Exploit kits (ready to use software package to automate cybercrime)
5. Botnets (hijacked computers that are remotely controlled)
6. (Distributed) Denial of Service attacks (DDoS/DoS)
7. Phishing (fraud mails and websites)
8. Compromising confidential information (data breaches)
9. Rogueware/scareware
10. Spam

Finally, the Agency makes a number of conclusions for industry and stakeholders on how to better fight cyber threats to business, citizens and the digital economy at large. These include:

  • Use a common terminology within threat reports
  • Include the end-user perspective
  • Develop use cases for threat landscapes
  • Collect security intelligence of incidents including starting point and target of an attack
  • Perform a shift in security controls to accommodate emerging threat trends
  • Collect and develop better evidence about attack vectors (methods) so as to understand attack workflows
  • Collect and develop better evidence on the impact reached by attackers
  • Collect and maintain more qualitative information about threat agents.

Read the report.

•Date: 9th Jan 2013 • Europe/UK •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here