The period of time between the announcement of a vulnerability and the release of an associated exploit continues to shrink, making it increasingly likely that we will see a so-called "zero-day" threat. A zero-day blended threat (i.e., one that uses multiple methods and techniques to spread) could target a vulnerability before that vulnerability is announced and a patch made available. . . .
Although Symantec's Internet Security Threat Report confirms a significant increase in 2003 of malicious code that exposes confidential data, enterprise security is evolving to meet the challenge of these cyber attacks. A firewall is no longer just a firewall as newer software includes VPN tunneling and antivirus capabilities. Security point products are being integrated into multi-function security appliances for comprehensive protection. Early warning solutions have emerged that provide `heads-up' notification of vulnerabilities and precursor threat activity with actionable guidance prior to full-fledged attacks. And more and more companies are choosing to co-source their security device monitoring and management to trusted security providers.

However, the challenge still looms as threats continue to grow in sophistication and intensity. Over 60,000 computer viruses have been identified in the wild with more than 1,700 new Win32 viruses being documented in the second half of 2003. There were more than 2,600 vulnerabilities discovered in 2003--an average of seven per day. And not only are threats to the security of the Internet increasing, but they're also speeding across the Net faster than ever, making it increasingly difficult to defend against them.

Information Security's Challenge

The period of time between the announcement of a vulnerability and the release of an associated exploit continues to shrink, making it increasingly likely that we will see a so-called "zero-day" threat. A zero-day blended threat (i.e., one that uses multiple methods and techniques to spread) could target a vulnerability before that vulnerability is announced and a patch made available.

Until the worm outbreaks of August 2003, exploits generally didn't emerge until months (or even years) after a vulnerability had been publicly disclosed. That window is now shrinking -- fast. In fact, last year's Blaster worm used a well-known Microsoft security flaw that had been announced only 26 days earlier. The recent Sasser worm, which began spreading widely on May 1, exploited a hole in a component of the Windows operating system for which Microsoft issued a patch on April 13.

The link for this article located at ebcvg.com is no longer available.