Cover Image
市場調查報告書

電腦網路犯罪和安全性的今後:金融機關及企業的威脅與降低 (2015-2020年)

The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation 2015-2020

出版商 Juniper Research 商品編碼 329757
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
Back to Top
電腦網路犯罪和安全性的今後:金融機關及企業的威脅與降低 (2015-2020年) The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation 2015-2020
出版日期: 2015年05月12日 內容資訊: 英文
簡介

本報告提供在電子商務和行動電子商務等之中面臨的電腦網路犯罪的威脅和企業應採取對策的相關調查、目前電腦網路犯罪趨勢、電腦網路犯罪主要的類型和特徵、今後發展的預測和迴避策略、資料洩漏的成本預測和各地區的明細等相關彙整。

第1章 摘要整理

  • 簡介
  • 定義
  • 電腦網路犯罪趨勢
  • 電腦網路金融犯罪趨勢、威脅
  • 設備基礎的電腦網路犯罪趨勢、威脅
  • 電腦網路犯罪的成本
  • 建議

第2章 簡介:電腦網路犯罪

  • 簡介
  • 定義
  • 電腦網路犯罪趨勢
    • 電腦網路犯罪模式的成熟
    • 成為標的零售業
    • 成為全球規模的電腦網路犯罪
    • 變專門的駭客行為
  • 電腦網路犯罪的成本
    • 各產業變化
    • 預測手法
    • 預測的前提條件與法規
    • 資料洩漏的預測
      • 電腦網路犯罪相關的資料洩漏量

第3章 電腦網路金融犯罪趨勢及威脅

  • 簡介
  • 電腦網路犯罪和金融業
    • 社交工程的重要性
    • 電腦網路金融犯罪的類型
    • 金融上的威脅評估
      • 銀行
      • 付款、匯款
      • 行動電子錢包
    • 要點

第4章 設備基礎的電腦網路犯罪趨勢及威脅

  • 簡介
  • 非常小的行動惡意程式
    • 設備電腦網路犯罪的類型
    • 設備上的威脅分析
      • 智慧型手機
      • 穿戴式 & IoT
    • 要點

圖表

目錄

Overview

Juniper Research provides actionable insights and expert strategic assessment of critical threats from cybercrime, outlining important remedial steps for companies.

This incisive report on the current and future cybercrime landscape provides an in-depth analysis of the current threats posed to a variety of vital digital commerce and connected device markets, as well as roadmapping their future evolution.

Key Features

  • Investigates the threats posed to key eCommerce and mCommerce sectors, including payments, money transfer, retail and banking.
  • Analysis of developments in the cybercrime ecosystem and what they imply for the future direction of malware for devices, from smartphones to wearables and the Internet of Things.
  • Typology of cybercrime threats, with key features and protective strategies included alongside the likely evolution of cybercrime.
  • Juniper Threat Landscape Assessment and future projections for the level of threat and its probable impact on each sector.
  • Projections of the scale and cost of data breaches at a global and regional level from 2015 to 2020.

Key Questions

  • 1. What are the key cybercrime threats that businesses and consumers need to defend against?
  • 2. What is the likely impact of different kinds of cybercrime on key financial and device market sectors?
  • 3. How will cybercrime threats evolve in the future?
  • 4. What malware threats will the IoT face?
  • 5. What is the cost of criminal data breaches and how will this change in future?

Companies Referenced

Mentioned: Apple, Forbes, Google, Home Depot, IBM, ITRC (Identity Theft Resource Centre), JPMorgan Chase, Kaspersky Lab, Kindsight, Kmart, Microsoft, Neustar, Palo Alto Networks, RAND, Target, Venafi Labs, Verizon.

Data & Interactive Forecast

Juniper Research's highly granular interactive Excels enable clients to manipulate Juniper's forecast data and charts to test their own assumptions by performing what-if analysis, and compare select markets and sectors side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Forecast suite includes:

  • Data breach forecast splits for 8 key regions.
  • What-If Analysis tool allowing user the ability to manipulate Juniper's data for 4 different metrics.
  • Access to the full set of forecast data of 7 tables and 378 data points.

Table of Contents

1. Executive Summary

  • 1.1. Introduction
  • 1.2. Definitions
  • 1.3. Trends in Cybercrime
    • Table 1.1: Cybercrime Trends
  • 1.4. Financial Cybercrime Trends & Threats
  • 1.5. Device-based Cybercrime Trends & Threats
  • 1.6. The Cost of Cybercrime
    • Figure & Table 1.2: Total Criminal Data Breaches per annum 2015-2020, Split by 8 Key Regions
    • Figure & Table 1.3: Cost of Criminal Data Breaches per annum ($m) 2015-2020, Split by 8 Key Regions
  • 1.7. Recommendations

2. Introduction to Cybercrime

  • 2.1. Introduction
  • 2.2. Definitions
  • 2.3. Trends in Cybercrime
    • 2.3.1. Cybercriminal Business Models Mature
      • Table 2.1: Goods and Services on the Cybercriminal Black Market
    • 2.3.2. Retail Becomes a Target
    • 2.3.3. Cybercrime Goes Global
    • 2.3.4. Hacktivism Goes Pro
      • Figure 2.2: Known Cyberattack Motivations 2012-2014
  • 2.4. The Cost of Cybercrime
    • 2.4.1. Variations by industry
      • Figure 2.3: Distribution of Records Exposed per Breach as a Proportion of the Total Data Breaches per Industry (%)
      • Table 2.4: Distribution of Breach Sizes as a Proportion of the Total Data Breaches per Industry (%)
    • 2.4.2. Forecast Methodology
      • Figure 2.5: Criminal Data Breach Forecast Methodology
    • 2.4.3. Forecast Assumptions and Limitations of Analysis
    • 2.4.4. Data Breach Forecasts
      • i. Number of Cybercrime-related Data Breaches
        • Figure & Table 2.6: Total Criminal Data Breaches per annum 2015-2020, Split

8. Key Regions

  • ii. Cost of Cybercrime-related Data Breaches
    • Figure & Table 2.7: Cost of Criminal Data Breaches per annum ($m) 2015-2020, Split by 8 Key Regions

3. Financial Cybercrime Trends and Threats

  • 3.1. Introduction
  • 3.2. Cybercrime and the Finance Industry
    • 3.2.1. The Importance of Social Engineering
    • 3.2.2. Financial Cybercrime Typology
      • Figure 3.1: Bankun Phishing App Update Screen
      • Figure 3.2: Timeline of Zeus Malware Evolution
      • Figure 3.3: GOZ/CryptoLocker Scope
    • 3.2.3. Juniper's Financial Threat Assessments
      • i. Banking
        • Figure 3.4: Juniper Research Banking Cybercrime Threat Landscape Assessment
        • Figure 3.5: Juniper Banking Cybercrime Threat Landscape Forecast
      • ii. Payments and Money Transfer
        • Figure 3.6: Juniper Payments and Money Transfer Cybercrime Threat Landscape Assessment
        • Figure 3.7: Juniper Payments and Money Transfer Cybercrime Threat Landscape Forecast
      • iii. Mobile Wallets
        • Figure 3.8: Juniper Mobile Wallets Cybercrime Threat Landscape Assessment
        • Figure 3.9: Juniper Mobile Wallets Cybercrime Threat Landscape Forecast
    • 3.2.4. Key Takeaways

4. Device-based Cybercrime Trends and Threats

  • 4.1. Introduction
  • 4.2. Mobile Malware is Miniscule
    • 4.2.1. Device Cybercrime Typology
      • Figure & Table 4.1: Android Versions in Use (%) April 2015
      • Table 4.2: Selection of App Developers Using the Same Certificates
    • 4.2.2. Juniper's Device Threat Assessment
      • i. Smartphones
        • Figure 4.3: Juniper Smartphones Cybercrime Threat Landscape Assessment
        • Figure 4.4: Juniper Smartphones Cybercrime Threat Landscape Forecast
      • ii. Wearables & IoT
        • Figure 4.5: Juniper Wearables/IoT Cybercrime Threat Landscape Forecast
    • 4.2.3. Key Takeaways
Back to Top