Cover Image
市場調查報告書

國家的網路安全開發:亞太地區

National Cybersecurity Development: Asia-Pacific

出版商 ABI Research 商品編碼 327763
出版日期 內容資訊 英文 34 Pages; 5 Tables, 7 Charts
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
Back to Top
國家的網路安全開發:亞太地區 National Cybersecurity Development: Asia-Pacific
出版日期: 2015年04月03日 內容資訊: 英文 34 Pages; 5 Tables, 7 Charts
簡介

本報告提供亞太地區網路安全形勢的相關調查,提供您國家的網路安全干預和安全性市場動態分析,大型國際企業和活躍的新興企業,再彙整地區供應商的生態系統等資料,為您概述為以下內容。

第1章 電腦網路膨脹論的溫床

  • 北亞洲戰鬥
  • 大的賭
  • 高成本
  • 軍隊支援的攻擊
  • 中國:發電廠的間諜行為和資料小偷
  • 南太平洋
  • 新興大國
  • 電腦網路威脅動態的擴大

第2章 高標準的威脅促進國家的開發

  • 地區性的合作
  • 全球網路安全目錄
  • 澳洲
  • 印度
  • 日本
  • 韓國
  • 馬來西亞
  • 中國
  • 紐西蘭
  • 新加坡·香港
  • 電腦網路新興國家
  • 重要基礎設施安全支出

第3章 地區內的擴大依然受限

  • AhnLab
  • Digify
  • Hitachi Data Systems
  • Huawei Technologies
  • NEC (日本電氣)
  • Nexusguard
  • Trend Micro
  • V-Key

圖表

目錄
Product Code: AN-1497

The report on National Cybersecurity Development: Asia Pacific looks at the cyberthreat landscape in the region, before diving into analysis of national cybersecurity engagement and the dynamics of national security markets. The report also looks at the local vendor ecosystem, including large international players and dynamic startups.

Table of Contents

1. HOTBED OF CYBER EXPANSIONISM

  • 1.1. North Asian Battles
  • 1.2. High Stakes
  • 1.3. High Costs
  • 1.4. Military-backed Aggression
  • 1.5. China: An Espionage and Data-theft Power Plant
  • 1.6. South Pacific Players
    • 1.6.1. Oceania and Asian Tigers
    • 1.6.2. South Asian Aspiring Economies
  • 1.7. Emerging Giants
  • 1.8. Growing Cyberthreat Dynamics

2. HIGH-LEVEL THREATS DRIVE NATIONAL DEVELOPMENT

  • 2.1. Regional Cooperation
  • 2.2. The Global Cybersecurity Index
  • 2.3. Australia
    • 2.3.1. Law and Policy Implementation
    • 2.3.2. Organizational Measures
    • 2.3.3. Private and Public Partnerships
  • 2.4. India
    • 2.4.1. A New Cybersecurity Strategy
    • 2.4.2. Implementation Limitations
    • 2.4.3. Efforts to Boost Cooperative Partnerships
    • 2.4.4. External Opportunities
  • 2.5. Japan
    • 2.5.1. Dedicated Policy Implementation
    • 2.5.2. Organizational Improvements
    • 2.5.3. Advanced Critical Infrastructure Protection
  • 2.6. South Korea
    • 2.6.1. Technical Clout Driven by Strong Organizational Measures
    • 2.6.2. Emphasis on Research and Development and Training
    • 2.6.3. Leveraging Cooperation and Information Sharing
  • 2.7. Malaysia
    • 2.7.1. Policy Framework
    • 2.7.2. Technical Expertise
  • 2.8. China
  • 2.9. New Zealand
  • 2.10. Singapore and Hong Kong
  • 2.11. Emerging Cyber Nations
  • 2.12. Critical Infrastructure Security Spending
    • 2.12.1. Methodology

3. HOMEGROWN EXPANSION STILL LIMITED

  • 3.1. AhnLab
  • 3.2. Digify
  • 3.3. Hitachi Data Systems
  • 3.4. Huawei Technologies
  • 3.5. NEC
  • 3.6. Nexusguard
  • 3.7. Trend Micro
  • 3.8. V-Key

Tables

  • 1. Cyberthreat Agents, 2H 2014
  • 2. Global Cybersecurity Index (GCI), 2014
  • 3. Total CI Security Spending by Region, Regional Markets, Forecast: 2015 to 2020
  • 4. Asia-Pacific CI Security Spending by Sector, Regional Markets, Forecast: 2015 to 2020
  • 5. Asia-Pacific CI Security Spending by Top 5 Countries, Country Markets, Forecast: 2015 to 2020

Charts

  • 1. Australia GCI Scoring, 2014
  • 2. India GCI Scoring, 2014
  • 3. Japan GCI Scoring, 2014
  • 4. Republic of Korea GCI Scoring, 2014
  • 5. Malaysia GCI Scoring, 2014
  • 6. China GCI Scoring, 2014
  • 7. New Zealand GCI Scoring, 2014
Back to Top