locked
Abney and Associates: The upcoming cyber-security threat cycle RRS feed

  • Question

  • abney and associates

    source: http://j-smith01.deviantart.com/journal/Abney-Associates-The-cyber-security-threat-cycle-375966142

    The first PC viruses appeared more than 25 years ago. Little did we realize that this was just the beginning of what would become a series of threat waves.

    For nearly 10 years viruses endured as the primary method of attack, but over time were largely matched by defenders’ talents to block and protect against them. Motivated by the notoriety and knowledge gained by discovering and publicizing a new vulnerability, attackers continued to innovate. What ensued were distinct threat cycles. From macro viruses to worms to spyware and rootkits, approximately every five years attackers would launch new types of threats and defenders would protect against them.

    It’s no surprise that we can map these cycles to major technology shifts that presented new attack vectors. Early viruses targeted primarily the operating system and were spread by the ‘sneaker net.’ Macro viruses took advantage of users sharing files. Worm-type threats that moved from machine to machine leveraged enterprise networks and the increasing use of the Internet. And spyware and rootkits emerged with new applications, devices and online communities.

    This brings us to today, when we find ourselves combating advanced malware, targeted attacks and advanced persistent threats (APTs). Is this just the latest threat wave, or is this more akin to a tsunami? A confluence of factors makes these threats more damaging than anything we have experienced in the past. These factors includes an explosion of attack vectors such as the advent of mobilization, bring your own device (BYOD), virtualization and the cloud that have spurred a breadth of new devices, infrastructure and networks, and a range of operating systems and applications that provide new, efficient mechanisms to transport malware and conduct attacks. And while social media, mobile applications, websites and Web-enabled applications have created new ways for a variety of users to connect (employees, partners, customers), they have also exposed individuals and organizations to new inbound and outbound security threats.

    • Changed type Soh.M Thursday, October 3, 2013 3:39 PM requires support
    Thursday, June 6, 2013 1:24 AM

Answers

  • So currently was your organization under attack from these viruses ? Any help needed ?

    Try this below scripts which i have created :) keep a copy with you in future if you need it you can use it.

    http://gallery.technet.microsoft.com/Removing-Conficker-Virus-944d4ae3


    Guowen Su
    Cisco Certified Network Associate
    Cisco Certified Internetwork professional - MPLS
    Certified Information Systems Security Professional
    Microsoft Partner Network 2011
    Microsoft Certified Professional
    Microsoft Certified Systems Administrator:Security
    Microsoft Certified Systems Engineer: Security
    Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Network Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows Server 2008 Applications Infrastructure, Configuration
    Microsoft Certified Technology Specialist: Windows 7, Configuring
    Microsoft Certified IT Professional: Enterprise Administrator
    Microsoft Certified IT Professional: Server Administrator
    Certified Ethical Hacker
    Computer Hacking Forensics Investigator
    Certified Sonicwall Security Administrator
    Microsoft Geeks


    • Edited by Soh.M Thursday, October 3, 2013 4:08 PM insert html
    • Marked as answer by Soh.M Thursday, October 3, 2013 4:08 PM
    Thursday, October 3, 2013 3:41 PM