internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
p. 59<br />
Symantec Corporation<br />
Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />
95 Appendix :: B<br />
Malicious Code Trends<br />
97 Top Malicious Code Families<br />
98 Overall Top Malicious Code Families, 2012<br />
99 Relative Volume of Reports of Top 10 Malicious Code Families<br />
in 2012 by Percentage<br />
99 Relative Proportion of Top 10 Malicious Code Blocked in Email<br />
Traffic by Symantec.cloud in 2012 by Percentage and Ratio<br />
100 Trend of Malicious Code Blocked in Email Traffic by Symantec.cloud<br />
– 2011 vs 2012<br />
100 Relative Proportion of Top 10 Malicious Code Blocked in Web<br />
Traffic by Symantec.cloud in 2012 by Percentage and Ratio<br />
102 Analysis of Malicious Code Activity by Geography,<br />
Industry Sector, and Company Size<br />
102 Proportion of Email Traffic Identified as Malicious,<br />
by Industry Sector, 2012<br />
103 Proportion of Email Traffic Identified as Malicious<br />
by Organization Size, 2012<br />
103 Proportion of Email Traffic Identified as Malicious<br />
by Geographic Location, 2012<br />
105 Propagation Mechanisms<br />
106 Propagation Mechanisms<br />
108 Industrial Espionage: Targeted Attacks<br />
and Advanced Persistent Threats (APTs)<br />
109 Average Number of Targeted Email Attacks Per Day, 2012<br />
111 Targeted Attacks by Company Size, 2012<br />
111 Targeted Attacks Against Job Function, 2012<br />
112 Breakdown of Document Types Being Attached<br />
to Targeted Attacks, 2012<br />
113 Analysis of Targeted Attacks by Top 10 Industry Sectors, 2012<br />
114 Malicious Code Trends Endnotes<br />
115 Appendix :: C<br />
Spam and Fraud Activity Trends<br />
117 Analysis of Spam Activity Trends<br />
117 Global Spam Volume in Circulation, 2012<br />
118 Proportion of Email Traffic Identified as Spam, 2011–2012<br />
119 Analysis of Spam Activity by Geography,<br />
Industry Sector, and Company Size<br />
119 Proportion of Email Traffic Identified as Spam<br />
by Industry Sector, 2012<br />
120 Proportion of Email Traffic Identified as Spam<br />
by Organization Size, 2012<br />
120 Proportion of Email Traffic Identified as Spam<br />
by Geographic Location, 2012<br />
122 Analysis of Spam Delivered by Botnets<br />
122 Percentage of Spam Sent from Botnets in 2012<br />
123 Analysis of Spam-sending Botnet Activity, 2012<br />
124 Significant Spam Tactics<br />
124 Frequency of Spam Messages by Size, 2012<br />
125 Proportion of Spam Messages Containing URLs, 2012<br />
125 Analysis of Top-level Domains Used in Spam URLs, 2012<br />
126 Spam by Category<br />
127 Spam by Category, 2012<br />
128 Spam by Category, 2012<br />
129 Phishing Activity Trends<br />
129 Phishing Rates, 2011–2012<br />
130 Phishing Category Types, Top 200 Organizations, 2012<br />
130 Tactics of Phishing Distribution, 2012<br />
132 Analysis of Phishing Activity by Geography,<br />
Industry Sector, and Company Size<br />
132 Proportion of Email Traffic Identified as Phishing<br />
by Industry Sector, 2012