表紙
市場調査レポート

公的な脆弱性調査市場

Public Vulnerability Research Market in 2014

発行 Frost & Sullivan 商品コード 345256
出版日 ページ情報 英文 106 Pages
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=101.16円で換算しております。
Back to Top
公的な脆弱性調査市場 Public Vulnerability Research Market in 2014
出版日: 2015年11月12日 ページ情報: 英文 106 Pages
概要

当レポートでは、世界の公的な脆弱性調査市場 (2014年) について取り上げ、2013年〜2014年の脆弱性の状況について検証し、主な市場動向、競合分析、成長機会などについて、体系的な情報を提供しています。

第1章 エグゼクティブサマリー

第2章 市場概要

  • 調査目的
  • 市場概要
  • 公的な脆弱性開示のベストプラクティス
  • 進化するアタッカー
  • 用語と定義
  • 主な調査内容

第3章 調査手法

  • 調査手法

第4章 サイバー脅威分析と報告

  • イントロダクション
  • IoT
  • SCADA
  • Java
  • マルウェア
  • モバイルマルウェア

第5章 公的な脆弱性の市場動向

  • 報告済みの脆弱性:年別
  • 報告済みの脆弱性:四半期別
  • 市場動向
  • 脆弱性開示
  • 脆弱性開示:組織タイプ別

第6章 脆弱性の分析:深刻度別

  • 脆弱性の分析:深刻度別

第7章 標的にされたアプリケーションの比較

  • 標的にされたアプリケーション
  • 標的にされたアプリケーションの分析
  • 特に標的にされたアプリケーションのタイプ
  • 開示機関:ウェブブラウザの脆弱性
  • 開示機関:メディアアプリケーションの脆弱性
  • 開示機関:サーバーの脆弱性
  • 開示機関:ビジネスアプリケーションの脆弱性
  • 標的にされたアプリケーションの分析:タイプ別

第8章 標的にされたアプリケーションの分析:タイプ別 (続き)

第9章 脆弱性の分析

  • 脆弱性の定義
  • 報告済みの脆弱性:欠陥タイプ別
  • 開示機関:バッファオーバーフローエラー
  • 開示機関:コードインジェクションエラー

第10章 競合分析

  • 競合分析:検証済みの脆弱性
  • 競合分析:検証済み・未検証の脆弱性

第11章 公的な脆弱性の報告状況

  • 公的な脆弱性の報告状況

第12章 結論

第13章 付録

第14章 Frost & Sullivanについて

目次
Product Code: NFDF-74

The Evolving Threat Environment During the Internet of Things Era

The Frost & Sullivan analysis of the ‘global public vulnerability research market in 2014’ is part of a series of studies compiled from various public sources to analyze the public vulnerability landscape from 2013 to 2014. Vulnerability data is collected, queried, and segmented, resulting in a wealth of information that is intended to provide qualitative commentary on the research industry and to recognize the most prolific disclosers of new vulnerability reports. The top research companies are interviewed to provide industry and technology trends. Within this analysis, Frost & Sullivan has identified key market trends, competitive analysis, and growth opportunities to quantify and evaluate the public vulnerability research market.

Table of Contents

1. EXECUTIVE SUMMARY

Executive Summary

  • 1. Executive Summary-Key Findings

2. MARKET OVERVIEW

Market Overview

  • 1. Research Objectives
  • 2. Market Overview
  • 3. Market Overview (Continued)
  • 4. Market Overview (Continued)
  • 5. Market Overview (Continued)
  • 6. Market Overview (Continued)
  • 7. Market Overview-Best Practices Public Vulnerability Disclosing
  • 8. Market Overview-The Evolving Attacker
  • 9. Market Overview-Terminology and Definitions
  • 10. Market Overview-Terminology and Definitions (continued)
  • 11. Market Overview-Terminology and Definitions(continued)
  • 12. Market Overview-Key Questions This Insight Answers

3. RESEARCH METHODOLOGY

Research Methodology

  • 1. Research Methodology
  • 2. Research Methodology (continued)

4. CYBER THREAT ANALYSIS AND REPORTING

Cyber Threat Analysis and Reporting

  • 1. Introduction to Cyber Threat Analysis and Reporting
  • 2. The Internet of Things
  • 3. The Internet of Things (continued)
  • 4. The Internet of Things (continued)
  • 5. SCADA
  • 6. SCADA (continued)
  • 7. Software-Java
  • 8. Malware
  • 9. Malware (continued)
  • 10. Malware (continued)
  • 11. Mobile Malware

5. MARKET TRENDS IN PUBLIC VULNERABILITIES

Market Trends in Public Vulnerabilities

  • 1. Vulnerabilities Reported by Year
  • 2. Vulnerabilities Reported by Quarter
  • 3. Market Trends
  • 4. Market Trends (continued)
  • 5. Vulnerability Disclosure
  • 6. Vulnerability Disclosure (continued)
  • 7. Vulnerability Disclosure (continued)
  • 8. Vulnerability Disclosure by Organization Type
  • 9. Vulnerability Disclosure by Organization Type (continued)
  • 10. Vulnerability Disclosure by Organization Type (continued)

6. ANALYSIS OF VULNERABILITIES BY SEVERITY

Analysis of Vulnerabilities by Severity

  • 1. Analysis of Vulnerabilities by Severity
  • 2. Analysis of Vulnerabilities by Severity (continued)
  • 3. Analysis of Vulnerabilities by Severity (continued)
  • 4. Analysis of Vulnerabilities by Severity (continued)
  • 5. Analysis of Vulnerabilities by Severity (continued)
  • 6. Analysis of Vulnerabilities by Severity (continued)
  • 7. Analysis of Vulnerabilities by Severity (continued)
  • 8. Analysis of Vulnerabilities by Severity (continued)
  • 9. Analysis of Vulnerabilities by Severity (continued)

7. COMPARISON OF TARGETED APPLICATIONS

Comparison of Targeted Applications

  • 1. Targeted Applications
  • 2. Analysis of Targeted Applications
  • 3. Top Targeted Types of Applications
  • 4. Disclosing Institutions: Web Browser Vulnerabilities
  • 5. Disclosing Institutions: Media Applications Vulnerabilities
  • 6. Disclosing Institutions: Server Vulnerabilities
  • 7. Disclosing Institutions: Business Applications Vulnerabilities
  • 8. Analysis of Targeted Applications by Type
  • 9. Analysis of Targeted Applications by Type (continued)

8. ANALYSIS OF TARGETED APPLICATIONS BY TYPE (CONTINUED)

Analysis of Targeted Applications by Type (continued)

  • 1. Targeted Web Browser Type
  • 2. Targeted Web Browser Type (continued)
  • 3. Analysis of Targeted Web Browser Type

9. VULNERABILITY ANALYSIS

Vulnerability Analysis

  • 1. Vulnerability Definitions
  • 2. Vulnerability Definitions (continued)
  • 3. Vulnerabilities Reported by Flaw Type 2013
  • 4. Vulnerabilities Reported by Flaw Type (For 2014)
  • 5. Disclosing Institutions: Buffer Overflow Errors
  • 6. Disclosing Institutions: Code Injection Errors
  • 7. Top Impact Type
  • 8. Top Impact Types (continued)
  • 9. Analysis of Impact Types

10. COMPETITIVE ANALYSIS

Competitive Analysis

  • 1. Competitive Analysis Verified Vulnerabilities
  • 2. Competitive Analysis Verified Vulnerabilities (continued)
  • 3. Competitive Analysis Verified Vulnerabilities (continued)
  • 4. Competitive Analysis Verified and Unverified Vulnerabilities
  • 5. Competitive Analysis (continued)

11. THE STATUS OF PUBLIC VULNERABILITY REPORTING

The Status Of Public Vulnerability Reporting

  • 1. The Status of Public Vulnerability Reporting
  • 2. The Status of Public Vulnerability Reporting (continued)
  • 3. The Status of Public Vulnerability Reporting (continued)

12. CONCLUSIONS

Conclusions

  • 1. Conclusions

13. APPENDIX

Appendix

  • 1. Vulnerability Database Sources (for 2014)
  • 2. List of Publications Cited in This Report
  • 3. Legal Disclaimer

14. THE FROST & SULLIVAN STORY

The Frost & Sullivan Story

  • 1. The Frost & Sullivan Story
  • 2. Value Proposition: Future of Your Company & Career
  • 3. Global Perspective
  • 4. Industry Convergence
  • 5. 360° Research Perspective
  • 6. Implementation Excellence
  • 7. Our Blue Ocean Strategy
Back to Top