Sunteți pe pagina 1din 4

9/21/2017 What constitutes a cyber attack?

: Information Management : Public Safety | NEC

Global
Contact Us Support & Downloads Search inside NEC Site
Country & Region

Products & Solutions Case Studies About NEC

Home > Products & Solutions > Public Safety > By Business Needs > Information Management > What constitutes a cyber attack?

Public Safety Information Management


By Business Needs Like 12 Tweet Share

Citizen Services &


Immigration Control What constitutes a cyber attack?
Law Enforcement Cyber attacks are socially or politically motivated attacks carried out primarily through the Internet. Attacks target the
general public or national and corporate organizations and are carried out through the spread of malicious programs
Public Administration
(viruses), unauthorized web access, fake websites, and other means of stealing personal or institutional information
Services
from targets of attacks, causing far-reaching damage.

Critical Infrastructure From: Trend Micro Incorporated


Management

Information Management

Cyber Security Factory

Private SOC and Cyber


Security Factory

What constitutes a cyber


attack?

Emergency & Disaster


Management

Inter-Agency Collaboration

By Products

By Technology

Events Types of cyber attacks

Publications Targeted attack

Safe City Index 2015 Cyber attacks that are geared at particular organizations, services, and individuals to obtain private, technical, and
institutional information, and other intellectual assets for the purpose of vandalism or monetary gain.

APT (Advanced Persistent Threat)


Contact
A kind of targeted attack geared at a particular entity and carried out continuously and persistently using a variety of
means in order to gain access to the target. APTs are mainly divided into (1) attacks through public servers and
public websites on the Internet and (2) attacks against users through social engineering of target users into sending
malicious programs (typical example is targeted email attack).

DoS (Denial of Service) attack

an attack meant to disrupt services

DDoS (Distributed Denial of Service) attack

a DoS attack carried out from a distributed environment

Trends in cyber attack countermeasures

http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 1/4
9/21/2017 What constitutes a cyber attack? : Information Management : Public Safety | NEC
The borderlessness of the scope of unauthorized access and the sophistication and diversity of threats aimed at
illegal information access have escalated.
Although most government agencies and major corporations have fully deployed individual tools as information
security measures, targets of attacks have expanded to include, other than government institutions, critical
infrastructures and specific industries and corporations, calling for more robust counter measures.

Trends in cyber attack countermeasures

Overview of method used in targeted cyber attacks (typical)


Targeted attacks are becoming increasingly sophisticated as they go through different stages:

1. Espionage
2. Intrusion
3. Internal spread
4. Attack
5. Elimination of traces of activity

Overview of method used in targeted cyber attacks (typical)

Solutions to stop targeted attacks


Four countermeasures against targeted attacks

1. Entry counter-measure
2. Exit counter-measure
3. Counter-measure against information leaks

http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 2/4
9/21/2017 What constitutes a cyber attack? : Information Management : Public Safety | NEC
4. Status visualization

Four countermeasures against targeted attacks

Problems associated with targeted attack countermeasures

Methods for attacks have become more sophisticated (elusive), making it difficult to detect them

From: Trend Micro report on “Trends in Advanced Persistent Threats (APT) in Japan for 1H FY2012”

Mimic officially used documents or video applications

Delayed detection and initiation of countermeasures aggravate the extent of damage.


Since e-mails, document/image files contain confidential information, outsourcing [of cyber defense operations] is
difficult.

Operation of solutions against targeted cyber attacks is complicated.

There is a need for multiple countermeasures, from entry to exit.


Tools differ depending on the type of solution, requiring analysis of a large volume of alarms and logs.

Enables
Calls for an integrated surveillance platform that could be internally operated

http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 3/4
9/21/2017 What constitutes a cyber attack? : Information Management : Public Safety | NEC

Cyber Attack

Contact

Top of this page

Products & Solutions Government & Public Telecom Operators All Products & Solutions

News Press Releases Event Calendar

Support & Downloads Support Downloads

About NEC Corporate Profile Corporate Social Responsibility Investor Relations Research & Development Awards & Recognition

Privacy Policy Terms of Use Information Security Contact Us Site Map

Copyright © NEC Corporation 1994-2017. All rights reserved.

http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 4/4

S-ar putea să vă placă și