Thursday, March 23, 2006

The Art of Digital War - [Part 1]

The objective of this article is to identify the core issues around a digital intrusion. What are the key elements in Digital Intrusion? What is the impact on the enterprise? How do you classify the Intruders? How do you categorize your Assets?
Latest CERT reports a total of 5990[1] vulnerabilities for the year 2005 an increase of 58.5% from the year 2004 and a 3402% increase from the year 1995. Usually vulnerability in an application is due to un-identified bug in the code. However there are times when backdoors written explicitly in some application to get into a users machine.
To find out more about this, read more in my blog Security Datamining / The Art of Digital War


[1] 2005 Vulnerability List http://www.cert.org/stats/cert_stats.html

No comments: