30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

p. 59<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

95 Appendix :: B<br />

Malicious Code Trends<br />

97 Top Malicious Code Families<br />

98 Overall Top Malicious Code Families, 2012<br />

99 Relative Volume of Reports of Top 10 Malicious Code Families<br />

in 2012 by Percentage<br />

99 Relative Proportion of Top 10 Malicious Code Blocked in Email<br />

Traffic by Symantec.cloud in 2012 by Percentage and Ratio<br />

100 Trend of Malicious Code Blocked in Email Traffic by Symantec.cloud<br />

– 2011 vs 2012<br />

100 Relative Proportion of Top 10 Malicious Code Blocked in Web<br />

Traffic by Symantec.cloud in 2012 by Percentage and Ratio<br />

102 Analysis of Malicious Code Activity by Geography,<br />

Industry Sector, and Company Size<br />

102 Proportion of Email Traffic Identified as Malicious,<br />

by Industry Sector, 2012<br />

103 Proportion of Email Traffic Identified as Malicious<br />

by Organization Size, 2012<br />

103 Proportion of Email Traffic Identified as Malicious<br />

by Geographic Location, 2012<br />

105 Propagation Mechanisms<br />

106 Propagation Mechanisms<br />

108 Industrial Espionage: Targeted Attacks<br />

and Advanced Persistent Threats (APTs)<br />

109 Average Number of Targeted Email Attacks Per Day, 2012<br />

111 Targeted Attacks by Company Size, 2012<br />

111 Targeted Attacks Against Job Function, 2012<br />

112 Breakdown of Document Types Being Attached<br />

to Targeted Attacks, 2012<br />

113 Analysis of Targeted Attacks by Top 10 Industry Sectors, 2012<br />

114 Malicious Code Trends Endnotes<br />

115 Appendix :: C<br />

Spam and Fraud Activity Trends<br />

117 Analysis of Spam Activity Trends<br />

117 Global Spam Volume in Circulation, 2012<br />

118 Proportion of Email Traffic Identified as Spam, 2011–2012<br />

119 Analysis of Spam Activity by Geography,<br />

Industry Sector, and Company Size<br />

119 Proportion of Email Traffic Identified as Spam<br />

by Industry Sector, 2012<br />

120 Proportion of Email Traffic Identified as Spam<br />

by Organization Size, 2012<br />

120 Proportion of Email Traffic Identified as Spam<br />

by Geographic Location, 2012<br />

122 Analysis of Spam Delivered by Botnets<br />

122 Percentage of Spam Sent from Botnets in 2012<br />

123 Analysis of Spam-sending Botnet Activity, 2012<br />

124 Significant Spam Tactics<br />

124 Frequency of Spam Messages by Size, 2012<br />

125 Proportion of Spam Messages Containing URLs, 2012<br />

125 Analysis of Top-level Domains Used in Spam URLs, 2012<br />

126 Spam by Category<br />

127 Spam by Category, 2012<br />

128 Spam by Category, 2012<br />

129 Phishing Activity Trends<br />

129 Phishing Rates, 2011–2012<br />

130 Phishing Category Types, Top 200 Organizations, 2012<br />

130 Tactics of Phishing Distribution, 2012<br />

132 Analysis of Phishing Activity by Geography,<br />

Industry Sector, and Company Size<br />

132 Proportion of Email Traffic Identified as Phishing<br />

by Industry Sector, 2012

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!