third Cyber Security Assessment Netherlands - NCSC
third Cyber Security Assessment Netherlands - NCSC
third Cyber Security Assessment Netherlands - NCSC
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Core assessment » 4 Resilience: vulnerabilities<br />
»<br />
»»»»»<br />
Number of CVE IDs per annum<br />
8000<br />
7000<br />
6000<br />
5000<br />
4000<br />
3000<br />
2000<br />
1000<br />
Y2000<br />
Y2001<br />
Y2002<br />
Y2003<br />
Y2004<br />
Y2005<br />
Y2006<br />
Y2007<br />
Y2008<br />
Y2009<br />
Y2010<br />
Y2011<br />
Y2012<br />
Number<br />
Trend<br />
Figure 3. Number of unique vulnerabilities recorded per year (source: NVD)<br />
Number of cleaned computers<br />
15<br />
12<br />
9<br />
6<br />
3<br />
0<br />
2009 2010 2011 2012<br />
Q1-Q2 Q3-Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4<br />
The <strong>Netherlands</strong><br />
World<br />
[24: MS 2012-1]<br />
Figure 4. Relative volume of infections detected per thousand scans in the <strong>Netherlands</strong> and the rest of the world<br />
4.3 Conclusion<br />
On the one hand, the resilience comprises (the absence of )<br />
vulnera bi lity of the interests to be protected and, on the other<br />
hand, measures to be used to reduce the vulnerability. The<br />
presence of vulnerabilities means that our society remains<br />
vulnerable to cyber attacks.<br />
The IT sector continues to be highly vulnerable. Following a few<br />
years of reduced levels, the openly published vulnerabilities in<br />
software are increasing again (+27 per cent) and the number of<br />
published vulnerabilities in industrial control systems is also rising.<br />
Data has become mobile and loss or theft of mobile devices makes<br />
the stored data possibly accessible to the finder. In the case of<br />
hyperconnectivity, all types of devices are connected to each other,<br />
35