...
首页> 外文期刊>Network world >Assessing the APT threat
【24h】

Assessing the APT threat

机译:评估APT威胁

获取原文
获取原文并翻译 | 示例

摘要

Do security vendors secretly create the attacks their tools are designed to ward off? Of course not, but that old chestnut hints at a broader suspicion about whether the current state of security is really as bad as the security firms make it out to be, espe- cially when it comes to the latest poster child: advanced persistent threats. To ascertain just how real the APT threat is, the Enterprise Strategy Group surveyed 244 security profes- sionals in companies with more than 1,000 employees. "When we started this project there was a fair amount of debate about APTs," says Jon Oltsik, a principal analyst at ESG and a Network World blogger. "Was this type of attack real and unique or were APTs nothing more than a marketing term to add an alarming label to pedestrian types of cyber attacks?"
机译:安全厂商是否会秘密地制造其工具旨在抵御的攻击?当然不是,但是那个老栗子暗示了人们对当前安全状况是否真的像安全公司所说的那样糟糕的怀疑,尤其是对于最新的招贴子:持续存在的威胁。为了确定APT威胁的真实程度,Enterprise Strategy Group对员工超过1000名的公司中的244位安全专业人员进行了调查。 ESG首席分析师兼《网络世界》博客作者Jon Oltsik说:“当我们开始这个项目时,关于APT的争论很多。” “这种类型的攻击是真实而独特的吗?或者,APT仅仅是为了给行人类型的网络攻击添加一个令人震惊的标签的营销术语?”

著录项

  • 来源
    《Network world 》 |2011年第20期| p.3| 共1页
  • 作者

    JOHN DIX;

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号