Documente Academic
Documente Profesional
Documente Cultură
Global
Contact Us Support & Downloads Search inside NEC Site
Country & Region
Home > Products & Solutions > Public Safety > By Business Needs > Information Management > What constitutes a cyber attack?
Information Management
Inter-Agency Collaboration
By Products
By Technology
Safe City Index 2015 Cyber attacks that are geared at particular organizations, services, and individuals to obtain private, technical, and
institutional information, and other intellectual assets for the purpose of vandalism or monetary gain.
http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 1/4
9/21/2017 What constitutes a cyber attack? : Information Management : Public Safety | NEC
The borderlessness of the scope of unauthorized access and the sophistication and diversity of threats aimed at
illegal information access have escalated.
Although most government agencies and major corporations have fully deployed individual tools as information
security measures, targets of attacks have expanded to include, other than government institutions, critical
infrastructures and specific industries and corporations, calling for more robust counter measures.
1. Espionage
2. Intrusion
3. Internal spread
4. Attack
5. Elimination of traces of activity
1. Entry counter-measure
2. Exit counter-measure
3. Counter-measure against information leaks
http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 2/4
9/21/2017 What constitutes a cyber attack? : Information Management : Public Safety | NEC
4. Status visualization
Methods for attacks have become more sophisticated (elusive), making it difficult to detect them
From: Trend Micro report on “Trends in Advanced Persistent Threats (APT) in Japan for 1H FY2012”
Enables
Calls for an integrated surveillance platform that could be internally operated
http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 3/4
9/21/2017 What constitutes a cyber attack? : Information Management : Public Safety | NEC
Cyber Attack
Contact
Products & Solutions Government & Public Telecom Operators All Products & Solutions
About NEC Corporate Profile Corporate Social Responsibility Investor Relations Research & Development Awards & Recognition
http://www.nec.com/en/global/solutions/safety/info_management/cyberattack.html 4/4