The ENISA 2012 Security Analysis

Print

ENISAThe EU security agency, ENISA, releases the first Cyber Threat Landscape report, a summary of over 120 threat reports from 2011 and 2012 from the security industry, standardisation bodies and other independent parties. 

According to the agency the report provides an overview of observed threats and theat agents, as well as current top threats and emerging threat trend landscapes within mobile computing, social media, critical infrastructure, trust infrastructures, cloud and big data. 

The report identifies the "cyber enemy" with an analysis and listing of the top ten (out of 16) threats. These are as follows:


  1. Drive-by exploits (malicious code injects to exploit web browser vulnerabilities)
  2. Worms/trojans
  3. Code injection attacks
  4. Exploit kits (ready to use software package to automate cybercrime)
  5. Botnets (hijacked computers that are remotely controlled)
  6. (Distributed) Denial of Service attacks (DDoS/DoS)
  7. Phishing (fraud mails and websites)
  8. Compromising confidential information (data breaches)
  9. Rogueware/scareware
  10. Spam

ENISA also has a number of conclusions on how one can better fights cyber threats: 

"I am proud that the Agency undertakes this important work to better understand the composition of the current cyber threats," ENISA director Prof. Udo Helmbrecht says. "This is the first and most comprehensive Cyber Threat Analysis available to date and a point of reference for all cyber security policy makers, and stakeholders."

Go ENISA Threat Landscape Report