Cyber Security Report 2019 (Registro nro. 5573)

000 -LEADER
fixed length control field 01906nam a22003377a 4500
001 - CONTROL NUMBER
control field 00005573
003 - CONTROL NUMBER IDENTIFIER
control field ES-MaONT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210929062556.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190513s2019 sz ||||fry 0| u|eng u
024 ## - OTHER STANDARD IDENTIFIER
Additional codes following the standard number or code .
040 ## - CATALOGING SOURCE
Original cataloging agency ES-MaONT
110 2# - MAIN ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Swisscom
9 (RLIN) 3820
245 00 - TITLE STATEMENT
Title Cyber Security Report 2019
Remainder of title : Targeted Attacks
Statement of responsibility, etc. / Swisscom
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Worblaufen
Name of publisher, distributor, etc. : Swisscom (Switzerland) Ltd Group Security,
Date of publication, distribution, etc. February 2019
300 ## - PHYSICAL DESCRIPTION
Extent 34 p.
Other physical details : il., gráf.
Dimensions ; 1 documento PDF
336 ## - CONTENT TYPE
Content type term texto (visual)
Source isbdcontent
337 ## - MEDIA TYPE
Media type term electrónico
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term recurso en línea
Source rdacarrier
490 0# - SERIES STATEMENT
Series statement Studies & research
520 ## - SUMMARY, ETC.
Summary, etc. The current Cyber Security Report shows that the threat situation remains complex. The rising value of virtual assets is increasing the motivation for a targeted attack. New opportunities for attacks are emerging, e.g. by means of technological innovations. Nevertheless, the threat situation is stable in comparison with last year. Discover how the Threat Radar 2019 is looking and what Swisscom thinks of the threat situation. This year’s focus is on advanced persistent threats (APTs), which are in the “premier league” of hacker attacks. Get to know key players, what motivates them, their goals and how they work. We reveal which methods and tools hackers use most often. You will also gain insights into possible countermeasures to protect your company effectively.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciberseguridad y confianza
9 (RLIN) 2188
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cybersecurity
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term progreso digital
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term seguridad
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term amenaza
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term activos virtuales
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cyber protecion
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term cibercrime
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.swisscom.ch/content/dam/swisscom/en/about/company/portrait/network/security/documents/security-report-2019.pdf.res/security-report-2019.pdf">https://www.swisscom.ch/content/dam/swisscom/en/about/company/portrait/network/security/documents/security-report-2019.pdf.res/security-report-2019.pdf</a>
Nonpublic note Abierto
Link text Acceso al documento
Electronic format type pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Informes
Source of classification or shelving scheme
Existencias
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
        Acceso libre online Colección digital CDO CDO   20/12/2019   1000020175847 20/12/2019 20/12/2019 Informes pdf
Copyright© ONTSI. Todos los derechos reservados.
x
Esta web está utilizando la política de Cookies de la entidad pública empresarial Red.es, M.P. se detalla en el siguiente enlace: aviso-cookies. Acepto