Who's the enemy

January 2004
Management Services;Jan2004, Vol. 48 Issue 1, p31
Academic Journal
The article presents information on the Internet Risk Impact Summary Report for the third quarter of 2003 from ISS. The report reveals a 15 percent increase in the number of security incidents over the second quarter of 2003. The increase of confirmed attacks or events that present unusual risk was accompanied by a nine percent rise in overall security events, defined as anomalous or suspicious network behavior. ISS attributes the swell in security incidents to fast-moving attacks that quickly targeted vulnerabilities disclosed in the quarter. In the past reporting period, the company documented 725 new vulnerabilities, a decrease of two over the previous quarter, and 823 new viruses and worms, an increase of 26 percent over second quarter. The complete Q3 2003 IRIS Report is available for free download on Internet Security Systems' Web site. Serious vulnerabilities in the Microsoft operating system were exploited by the MS Blast and Nachi/Welchia worms, causing disruption for many organizations. These exploits appeared rapidly after vulnerability disclosure and successfully compromised many un-patched systems. Attack techniques were more varied and aggressive this quarter, and attempted to exploit a variety of old and new vulnerabilities using diverse attack vectors.


Related Articles

  • Be Wary of Microsoft Office Attachments.  // Database & Network Journal;Jun2007, Vol. 37 Issue 3, p24 

    The article reports that IBM's Internet Security Systems (ISS) X-Force research and development team has provided protection for customers against several serious flaws announced by Microsoft. The most significant Microsoft revelation is a vulnerability it its Exchange Server that can allow...

  • Internet Security Systems Report.  // Database & Network Journal;Feb2007, Vol. 37 Issue 1, p26 

    The article focuses on the findings of the Internet Security Systems Inc. (ISS) 2006 security statistics report. The report indicates that there were 7,247 new security weaknesses recorded and analyzed by the X-Force research and development team. Over 88 percent of the total weaknesses in...

  • DOWNTIME.  // Computer Weekly;5/13/2003, p48 

    Presents news briefs related to the computer industry as of May 13, 2003. Comparison of mobile phone usage by teenagers and people over the age of 30; Hacking of servers of Internet Security Systems Inc. by intruders; Development of Alta-thin screen that can display electronic text by...

  • New IP Threat.  // Management Services;Sep2003, Vol. 47 Issue 9, p28 

    Internet Protocol (IP) version 6 (IPv6) is the designated successor for the current IP version 4 and carries several performance and security advantages over earlier versions. Internet Security Systems' (ISS) Dynamic Threat Protection platform is the first and only security platform to provide...

  • Internet security increases as Web technology advances.  // Caribbean Business;7/5/2001, Vol. 29 Issue 27, p35 

    Reports the impact of advances in Internet technology on Internet security in Puerto Rico. Need to protect electronic transactions; Role of Internet Security Systems Inc. in electronic commerce security; Focus on European retail business.


    Reports that Atlanta, Georgia-based Internet Security Systems Inc. has introduced RealSecure Network Sensor and RealSecure Guard for security of the computer system. Features of the security software; Pros and cons of the security software; Operational working of the security software.

  • ISS software keeps an eye on applications. Messmer, Ellen // Network World;8/19/2002, Vol. 19 Issue 33, p20 

    Reports on Internet Security Systems' launch of the RealSecure Desktop Protector 3.5 software, which blocks unauthorized applications from invading a system. Software's basis on the BlackIce technology that the company obtained through its acquisition of Network Ice; Remote control of...

  • Anti-intrusion group signs up 40 members. Wilson, Matthew; Fitzloff, Emily // InfoWorld;10/19/98, Vol. 20 Issue 42, p1 

    Reports on the formation of an alliance to ensure that companies' security products will interoperate with each other. Internet Security Systems Inc.'s intrusion-detection technology; Members of the alliance; Capabilities of the security system.

  • No end in sight. Andress, Mandy // InfoWorld;4/22/2002, Vol. 24 Issue 16, p42 

    Focuses on the report released by Internet Security Systems Inc. on Internet security threats for the early months of 2002. Key focus of the report; Average rate of hybrid threats per hour; Danger posed by automated attack scripts; Approaches that should be taken toward Internet security.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics