internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
internet security tHreAt rePOrt GOVernMent 2013
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
p. 60<br />
Symantec Corporation<br />
Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />
133 Proportion of Email Traffic Identified as Phishing<br />
by Organization Size, 2012<br />
133 Proportion of Email Traffic Identified as Phishing<br />
by Geographic Location, 2012<br />
135 Spam and Fraud Activity Endnotes<br />
136 Appendix :: D<br />
Vulnerability Trends<br />
138 Total Number of Vulnerabilities<br />
139 Total Vulnerabilities Identified, 2006–2012<br />
139 New Vulnerabilities Month by Month, 2011 and 2012<br />
140 Most Frequently Attacked Vulnerabilities in 2012<br />
142 Zero-day Vulnerabilities<br />
142 Volume of Zero-day Vulnerabilities, 2006–2012<br />
143 Zero-day Vulnerabilities Identified in 2012<br />
144 Web Browser Vulnerabilities<br />
144 Browser Vulnerabilities, 2011 and 2012<br />
146 Web Browser Plug-in Vulnerabilities<br />
147 Browser Plug-in Vulnerabilities in 2011 and 2012<br />
148 Web Attack Toolkits<br />
149 SCADA Vulnerabilities<br />
150 Vulnerability Trends Endnotes<br />
151 Appendix :: E<br />
Government Threat Activity Trends<br />
153 Malicious Activity<br />
by Critical Infrastructure Sector<br />
153 Malicious Activity by Critical Infrastructure Sector<br />
154 Sources of Origin<br />
for Government-targeted Attacks<br />
154 Sources of Origin for Government-targeted Attacks<br />
156 Attacks by Type –<br />
Overall Government and Critical Infrastructure Organizations<br />
157 Attacks by Type –<br />
Notable Critical Infrastructure Sectors<br />
158 Government Threat Activity Endnotes<br />
159 About Symantec<br />
159 More Information