Cover Image
市場調查報告書

網路安全:新的趨勢及投資展望

Cyber Security - Emerging Trends and Investment Outlook

出版商 Strategic Defence Intelligence 商品編碼 319003
出版日期 內容資訊 英文 59 Pages
訂單完成後即時交付
價格
Back to Top
網路安全:新的趨勢及投資展望 Cyber Security - Emerging Trends and Investment Outlook
出版日期: 2014年11月19日 內容資訊: 英文 59 Pages
簡介

本報告提供全球網路安全環境、電腦網路攻擊的潛在性起源、為了對抗電腦網路攻擊採用策略的愛好,及今後的網路安全產品/服務的投資計劃等的相關分析、對企業的電腦網路攻擊的潛在影響相關執行的見解和網路安全的主要障礙的調查、有前途的網路安全產品市場特定,及網路安全產品/服務的需求預測等彙整資料,為您概述為以下內容。

目錄

  • 調查手法、樣品規模
  • 網路安全環境
  • 電腦網路攻擊給組織帶來的潛在的影響
  • 主要的電腦網路攻擊技術
  • 電腦網路攻擊的潛在起源
  • 電腦網路攻擊的發信國
  • 應對網路戰爭的威脅的主要課題
  • 對今後2年的網路安全產品/服務的投資計劃
  • 網路安全產品/服務預算的變化預測
  • 網路安全產品/服務的需求預測
  • 網路安全產品的主要市場
  • 附錄
目錄
Product Code: DF4315PR

Summary

"Cyber Security - Emerging Trends and Investment Outlook" is a new report by Strategic Defence Intelligence that globally analyzes cyber security environment, potential sources of cyber-attacks, preferred strategies deployed to counter cyber attacks, and planned investment on cyber security products and services over the next two years. This report also examines executive opinions about the potential impacts of cyber attacks on organizations. Furthermore, it analyzes key barriers to cyber security, identifies prominent markets for cyber security products and, projects demand for cyber security products and services over the next two years.

Key Findings

  • Executives expect cyber-attacks to result in security lapses, data leaks, and miscommunication within the organization
  • Email propagation of malicious code is the most frequently used technique by cyber-attackers
  • Executives state that the majority of cyber threats originate from China
  • Organizations are conducting periodic review of systems and administrative logs, and adopted computer security policies, to counter cyber-attacks over the next two years
  • The highest percentage of executives expect less than US$50 million of investments towards cyber security products/services over the next two years

This report is the result of an extensive survey drawn from Strategic Defence Intelligence's exclusive panel of leading global defense industry executives. The report analyzes prevailing cyber security scenario, and possible impact of cyber attacks on organizations. Furthermore, it provides information about the potential sources of cyber-attacks, significant countermeasures against cyber attacks, and projects change in budget for cyber security products and services during 2015 as compared to 2014. Moreover, this report evaluates key challenges in handling cyber warfare threats and identifies potential markets for cyber security products over the next two years.

In particular, it provides an in-depth analysis of the following:

  • Cyber security environment: examines incidences of cyber-attacks among organizations in the past 12 months
  • Prime cyber-attack techniques: identifies techniques that are most frequently used by cyber-attackers
  • Significant strategies deployed to counter cyber-attacks: analyzes strategies that organizations have implemented or are planning to implement over the next two years to counter cyber-attacks
  • Key barriers to cyber security: determines key issues/hurdles faced by organizations in handling cyber warfare threats
  • Planned investment on cyber security products/services over the next two years: examines investment planned by organizations on cyber security products/services for the next two years
  • Projected demand for cyber security products and services: identifies cyber security products and services that will record an increase in demand over the next two years
  • Cyber threats - originating countries: highlights countries from where most of the cyber threats usually originate
  • Key markets for cyber security products: identifies countries that will emerge as top spenders on cyber security products over the next two years

Reasons To Buy

  • The report highlights techniques that are most frequently used by cyber-attackers. This will help organizations to strengthen countermeasures against potential cyber-attacks
  • The report assists readers to restructure cyber security strategy by highlighting significant strategies deployed by organizations to counter cyber-attacks over the next two years
  • The report provides information about key potential markets for cyber security products. This will help organizations to develop business expansion plans
  • The report analyzes key challenges faced by organizations in handling cyber warfare threats. This will help organizations to revamp cyber security strategy
  • The report helps defense executives to recognize demand trends for cyber security products by identifying cyber security products and services that will record an increase in demand over the next two years

Table of Contents

  • Methodology and sample size
  • Cyber security environment
  • Potential impacts of cyberattacks on organizations
  • Prime cyberattack techniques
  • Potential sources of cyberattacks
  • Cyber threats originating countries
  • Significant strategies deployed to counter cyberattacks
  • Key challenges in handling cyber warfare threats
  • Planned investment on cyber security products/services over the next two years
  • Projected change in budget for cyber security products/services
  • Projected demand for cyber security products and services
  • Key markets for cyber security products
  • Appendix
Back to Top