presentación del mid-security report de cisco - agosto 2014
DESCRIPTION
El reporte Cisco 2014 Midyear Security Report examina los “vínculos débiles” en las organizaciones que contribuyen al panorama cada vez más creciente de amenazas. Estos vínculos débiles – que podrían ser software vencidos, malos códigos, propiedades digitales abandonadas, o errores de usuarios – contribuyen a la habilidad de los adversarios de explotar vulnerabilidades con métodos tales como consultas de DNS, kits de explotación, ataques de amplificación, compromiso del sistema point-of-sale (POS), malvertising, ransomware, infiltración de protocolos de cifrado, ingeniería social y spam “life event”.TRANSCRIPT
![Page 1: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/1.jpg)
![Page 2: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/2.jpg)
![Page 3: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/3.jpg)
![Page 4: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/4.jpg)
![Page 5: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/5.jpg)
![Page 6: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/6.jpg)
![Page 7: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/7.jpg)
![Page 8: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/8.jpg)
![Page 9: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/9.jpg)
![Page 10: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/10.jpg)
![Page 11: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/11.jpg)
![Page 12: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/12.jpg)
![Page 13: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/13.jpg)
![Page 14: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/14.jpg)
![Page 15: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/15.jpg)
![Page 16: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/16.jpg)
![Page 17: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/17.jpg)
![Page 18: Presentación del Mid-Security Report de Cisco - Agosto 2014](https://reader034.vdocument.in/reader034/viewer/2022052506/557afc94d8b42a79308b4841/html5/thumbnails/18.jpg)