Virus Vulnerabilities, Encounters, And Impact; Virus Encounter Vectors - HP Compaq t5720 Supplementary Manual

Virus vulnerability analysis
Hide thumbs Also See for Compaq t5720:
Table of Contents

Advertisement

Virus vulnerabilities, encounters, and impact

The following graph depicts security vulnerabilities experienced by actual enterprise customers as sur-
veyed by ICSA Labs for the years 1996 through 2002. The second graph contains the most vulnerable
technologies as perceived by the enterprises surveyed in 2003 by EDC. The graphs illustrate a strong cor-
relation between the actual occurrence of each vulnerability and its associated technology in an enter-
prise. For example, 86% of the encounters experienced in 2002 were e-mail related and according to
EDC, 50% of the enterprises surveyed in 2003 perceived e-mail as their most vulnerable technology.
The third graph illustrates the impact of these vulnerabilities on the enterprises surveyed by ICSA in 2002.

Virus encounter vectors

Note: "Other" in this graph represents unknown vectors and 3rd party/freeware software distribution.
3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Compaq t5725Compaq t5730

Table of Contents