Cover Image
市場調查報告書

公共漏洞調查市場

Public Vulnerability Research Market in 2014

出版商 Frost & Sullivan 商品編碼 345256
出版日期 內容資訊 英文 106 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
公共漏洞調查市場 Public Vulnerability Research Market in 2014
出版日期: 2015年11月12日 內容資訊: 英文 106 Pages
簡介

本報告以全球的公共漏洞調查市場 (2014年) 為主題,提供2013年∼2014年的漏洞狀況相關驗證、主要的市場趨勢、競爭分析、成長機會等相關的系統性資訊。

第1章 摘要整理

第2章 市場概要

  • 調查目的
  • 市場概要
  • 公共漏洞公開的最佳業務實踐
  • 攻擊者進化
  • 用語和定義
  • 主要的調查內容

第3章 調查手法

  • 調查手法

第4章 電腦網路威脅分析與報告

  • 簡介
  • IoT
  • SCADA
  • Java
  • 惡意程式
  • 行動惡意程式

第5章 公共漏洞的市場趨勢

  • 報告完畢的漏洞:各年度
  • 報告完畢的漏洞:各季
  • 市場趨勢
  • 漏洞公開
  • 漏洞公開:各組織類型

第6章 漏洞分析:各嚴重性

  • 漏洞分析:各嚴重性

第7章 目標應用比較

  • 目標應用
  • 目標應用分析
  • 特別具目標應用類型
  • 公開機關:瀏覽器的漏洞
  • 公開機關:媒體應用的漏洞
  • 公開機關:伺服器的漏洞
  • 公開機關:商業應用的漏洞
  • 目標應用分析:各類型

第8章 目標應用分析:各類型 (續)

第9章 漏洞分析

  • 漏洞定義
  • 報告完畢的漏洞:各缺點類型
  • 公開機關:緩衝溢出錯誤
  • 公開機關:代碼注入錯誤

第10章 競爭分析

  • 競爭分析:已檢驗的漏洞
  • 競爭分析:已檢驗、未檢驗的漏洞

第11章 公共漏洞的報告情形

  • 公共漏洞的報告情形

第12章 結論

第13章 附錄

第14章 關於Frost&Sullivan

目錄
Product Code: NFDF-01-00-00-00

The Evolving Threat Environment During the Internet of Things Era

The Frost & Sullivan analysis of the ‘global public vulnerability research market in 2014’ is part of a series of studies compiled from various public sources to analyze the public vulnerability landscape from 2013 to 2014. Vulnerability data is collected, queried, and segmented, resulting in a wealth of information that is intended to provide qualitative commentary on the research industry and to recognize the most prolific disclosers of new vulnerability reports. The top research companies are interviewed to provide industry and technology trends. Within this analysis, Frost & Sullivan has identified key market trends, competitive analysis, and growth opportunities to quantify and evaluate the public vulnerability research market.

Table of Contents

1. EXECUTIVE SUMMARY

Executive Summary

  • 1. Executive Summary-Key Findings

2. MARKET OVERVIEW

Market Overview

  • 1. Research Objectives
  • 2. Market Overview
  • 3. Market Overview (Continued)
  • 4. Market Overview (Continued)
  • 5. Market Overview (Continued)
  • 6. Market Overview (Continued)
  • 7. Market Overview-Best Practices Public Vulnerability Disclosing
  • 8. Market Overview-The Evolving Attacker
  • 9. Market Overview-Terminology and Definitions
  • 10. Market Overview-Terminology and Definitions (continued)
  • 11. Market Overview-Terminology and Definitions(continued)
  • 12. Market Overview-Key Questions This Insight Answers

3. RESEARCH METHODOLOGY

Research Methodology

  • 1. Research Methodology
  • 2. Research Methodology (continued)

4. CYBER THREAT ANALYSIS AND REPORTING

Cyber Threat Analysis and Reporting

  • 1. Introduction to Cyber Threat Analysis and Reporting
  • 2. The Internet of Things
  • 3. The Internet of Things (continued)
  • 4. The Internet of Things (continued)
  • 5. SCADA
  • 6. SCADA (continued)
  • 7. Software-Java
  • 8. Malware
  • 9. Malware (continued)
  • 10. Malware (continued)
  • 11. Mobile Malware

5. MARKET TRENDS IN PUBLIC VULNERABILITIES

Market Trends in Public Vulnerabilities

  • 1. Vulnerabilities Reported by Year
  • 2. Vulnerabilities Reported by Quarter
  • 3. Market Trends
  • 4. Market Trends (continued)
  • 5. Vulnerability Disclosure
  • 6. Vulnerability Disclosure (continued)
  • 7. Vulnerability Disclosure (continued)
  • 8. Vulnerability Disclosure by Organization Type
  • 9. Vulnerability Disclosure by Organization Type (continued)
  • 10. Vulnerability Disclosure by Organization Type (continued)

6. ANALYSIS OF VULNERABILITIES BY SEVERITY

Analysis of Vulnerabilities by Severity

  • 1. Analysis of Vulnerabilities by Severity
  • 2. Analysis of Vulnerabilities by Severity (continued)
  • 3. Analysis of Vulnerabilities by Severity (continued)
  • 4. Analysis of Vulnerabilities by Severity (continued)
  • 5. Analysis of Vulnerabilities by Severity (continued)
  • 6. Analysis of Vulnerabilities by Severity (continued)
  • 7. Analysis of Vulnerabilities by Severity (continued)
  • 8. Analysis of Vulnerabilities by Severity (continued)
  • 9. Analysis of Vulnerabilities by Severity (continued)

7. COMPARISON OF TARGETED APPLICATIONS

Comparison of Targeted Applications

  • 1. Targeted Applications
  • 2. Analysis of Targeted Applications
  • 3. Top Targeted Types of Applications
  • 4. Disclosing Institutions: Web Browser Vulnerabilities
  • 5. Disclosing Institutions: Media Applications Vulnerabilities
  • 6. Disclosing Institutions: Server Vulnerabilities
  • 7. Disclosing Institutions: Business Applications Vulnerabilities
  • 8. Analysis of Targeted Applications by Type
  • 9. Analysis of Targeted Applications by Type (continued)

8. ANALYSIS OF TARGETED APPLICATIONS BY TYPE (CONTINUED)

Analysis of Targeted Applications by Type (continued)

  • 1. Targeted Web Browser Type
  • 2. Targeted Web Browser Type (continued)
  • 3. Analysis of Targeted Web Browser Type

9. VULNERABILITY ANALYSIS

Vulnerability Analysis

  • 1. Vulnerability Definitions
  • 2. Vulnerability Definitions (continued)
  • 3. Vulnerabilities Reported by Flaw Type 2013
  • 4. Vulnerabilities Reported by Flaw Type (For 2014)
  • 5. Disclosing Institutions: Buffer Overflow Errors
  • 6. Disclosing Institutions: Code Injection Errors
  • 7. Top Impact Type
  • 8. Top Impact Types (continued)
  • 9. Analysis of Impact Types

10. COMPETITIVE ANALYSIS

Competitive Analysis

  • 1. Competitive Analysis Verified Vulnerabilities
  • 2. Competitive Analysis Verified Vulnerabilities (continued)
  • 3. Competitive Analysis Verified Vulnerabilities (continued)
  • 4. Competitive Analysis Verified and Unverified Vulnerabilities
  • 5. Competitive Analysis (continued)

11. THE STATUS OF PUBLIC VULNERABILITY REPORTING

The Status Of Public Vulnerability Reporting

  • 1. The Status of Public Vulnerability Reporting
  • 2. The Status of Public Vulnerability Reporting (continued)
  • 3. The Status of Public Vulnerability Reporting (continued)

12. CONCLUSIONS

Conclusions

  • 1. Conclusions

13. APPENDIX

Appendix

  • 1. Vulnerability Database Sources (for 2014)
  • 2. List of Publications Cited in This Report
  • 3. Legal Disclaimer

14. THE FROST & SULLIVAN STORY

The Frost & Sullivan Story

  • 1. The Frost & Sullivan Story
  • 2. Value Proposition: Future of Your Company & Career
  • 3. Global Perspective
  • 4. Industry Convergence
  • 5. 360° Research Perspective
  • 6. Implementation Excellence
  • 7. Our Blue Ocean Strategy
Back to Top