28.09.2016 Views

CYBERSECURITY

32524_edentree_cybersecurity_2109_lr_single-pages

32524_edentree_cybersecurity_2109_lr_single-pages

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Evolving motivations<br />

The motivations behind cyber-attacks can vary from profit seeking, corporate espionage and warfare,<br />

to protest, activism and enjoyment. According to Gemalto’s ‘Breach Level Index’, in 2015, 58% of<br />

cyber-attacks were conducted by malicious outsiders, while 14% were related to malicious insiders.<br />

State-sponsored cyber-activity was attributable for 2% of attacks. Nation states are increasingly<br />

leveraging cyber vulnerabilities to disrupt or obtain information (intellectual property, national security<br />

secrets or disruption for political gain) for economic gain or national security purposes. Given that it is<br />

possible to conceal identities and attack an enemy remotely, the risk for a nation-state is relatively low<br />

while the potential gain is high. Until something alters this dynamic, we are likely to see an increasing<br />

level in the number of state-sponsored attacks.<br />

INCIDENTS BY SOURCE<br />

Malicious outsider 58.0%<br />

Accidental loss 24.0%<br />

Malicious insider 14.0%<br />

Hacktivist 2.0%<br />

State sponsored 2.0%<br />

Source: Gemalto, Breach Level Index<br />

Amity Insight September 2016 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!