본문 바로가기
IT 와 Social 이야기/Security

[Mandiant 보안 리포트] 2014 Threat Report

by manga0713 2014. 4. 11.

 

[해커의 POS 시스템 접근 권한 획득 방법, 이미지 출처: Mandiant 2014 Threat Report p15, Fig 5 캡쳐]

 

 

○ Key Findings

 

- The median number of days threat actors were present on a victim’s network before they were detected was 229 days.

 

- 33% of organizations discovered breaches internally; 67% were notified by an external entity.

 

- Threat actors are expanding the uses of computer network exploitation to fulfill an array of objectives, from economic to political.

 

- In 2013, 44% if observed phishing emails were IT related, often attempting to impersonate the targeted company’s IT department.

 

 

- 리포트 내려받기 : [Mandiant] 2014 Threat Report