Search

ISTR : Internet Security Threat Report

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Cleary, Gillian</dc:creator>
<dc:creator>Symantec</dc:creator>
<dc:date>2018</dc:date>
<dc:description xml:lang="es">Sumario: From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coinminers, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. With each passing year, not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so. </dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/164151.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>Symantec</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:subject xml:lang="es">Internet</dc:subject>
<dc:subject xml:lang="es">Internet de las cosas</dc:subject>
<dc:subject xml:lang="es">Dispositivos móviles</dc:subject>
<dc:subject xml:lang="es">Redes sociales</dc:subject>
<dc:subject xml:lang="es">Aplicaciones informáticas</dc:subject>
<dc:subject xml:lang="es">Comercio electrónico</dc:subject>
<dc:type xml:lang="es">Books</dc:type>
<dc:title xml:lang="es">ISTR : Internet Security Threat Report</dc:title>
</rdf:Description>
</rdf:RDF>