The attack almanac

Access Full Text

The attack almanac

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Engineering & Technology — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

E-crime is not random - it follows world events and seasonal trends. So adopting an anticipatory security strategy can help close vulnerabilities. Traditional enterprise security methods are caught in a vicious cycle. Cyber-criminals take the initiative to set the strategy of attacks, the security vendors try frantically to catch-up once an attack is underway, and meanwhile the online malevolents have moved on to bigger and badder strikes, leaving the security sector scrambling to keep pace.

Inspec keywords: computer crime

Other keywords: cyber-criminals; enterprise security; online malevolents; anticipatory security; E-crime; attack almanac

http://iet.metastore.ingenta.com/content/journals/10.1049/et.2009.0111
Loading

Related content

content/journals/10.1049/et.2009.0111
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading