By Topic

How useful are attack trend resources?

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

The number of virus and worm reports and security bulletins documenting these trends has multiplied. However, despite all this information, does anyone actually know how many vulnerabilities and attacks truly exist? Analysts who follow these trends say that the rise in reports is simply due to more people monitoring networks for vulnerabilities. Other causes are the recent, rapid expansion in "always on" broadband access on devices used by unsophisticated users at the very edge of the network, and the automated tools that malware creators use to take advantage of these often unguarded connections.

Published in:

Security & Privacy, IEEE  (Volume:2 ,  Issue: 2 )