|14 May 2010||#1|
| || |
The Cyber Threat.
The Cyber Threat. Deconstructing the Problem to Promote Comprehensive Dialogue and Action
It is clear to most that the Internet, and related technology advancements, provides significant benefits for individuals, enterprises and governments. However, as global connectivity has grown, so has the cyber threat. This is why Microsoft, along with the ecosystem at large, works to combat the cyber threat and help protect our customers through a variety of mechanisms, including using security-focused development practices (the Security Development Lifecycle), sharing our understanding of the threat landscape through the Security Intelligence Report and working with partners throughout the industry to tackle specific threats like botnets.
For more than two decades, people have struggled to understand the cyber threat, evaluate the risks to individuals and organizations, and craft appropriate responses. Although many organizations have invested significantly in information assurance, it appears to many people that neither governments nor industry are well-positioned to respond to this highly complicated threat.
That is why in a keynote today at the East West Institute Cybersecurity Summit, I will discuss the reasons why cyber attacks often confound those responsible for crafting responses and suggest a new framework for creating effective strategies for responding to potential cyber attacks.
Specifically, I outline six distinct factors that I believe make understanding and quantifying cyber threats a challenge:
The Cyber Threat - Deconstructing the Problem to Promote Comprehensive Dialogue and Action - Microsoft On The Issues
|My System Specs|
|Similar help and support threads for2: The Cyber Threat.|
|Cyber Illusionist||Chillout Room|
|New ransom threat||Security News|
|Stuxnet 2.0? Researchers find new 'cyber-surveillance' malware threat||Security News|
|Error Threat - HELP||Performance & Maintenance|
|A Very Serious Threat||Security News|
|Cyber battle for the web||News|
|Should I use Threat Fire?||System Security|