Case Analysis
Kaspersky Lab: From Russia with Anti-virus
Industry Background: Software Security
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).
Chief concerns for this Industry are: Internet-based fraud, sophisticated viruses, illicit network access, and computer
…show more content…
The company’s product line includes: data protection, email and web security, endpoint protection, mobile security, network security, risk and compliance, Security-as-a-Service (SaaS), and security management. Industry leading products include: McAfee Total Protection for Endpoint, McAfee Network Security Platform and McAfee Enterprise Mobility Management.
(Gale, 2011; McAfee.com, 2011)
Kaspersky Labs, Inc.
Brief Background:
Kaspersky Lab, a Russian based private equity company, is Europe’s largest software company, providing anti-virus software for individual, corporate and mobile users (Kshetri, 2011). Kaspersky’s product line includes software applications for protecting systems against malware, viruses, worms, Trojans, spyware, adware, and e-mail spam. In addition, KL offers firewall products, consulting, implementation, software development and support services (Kshetri, 2011).
Kaspersky is different from its major competitors in that its headquarters borders Moscow; where most of its R&D activities are performed. Kaspersky has regional R&D offices throughout the U.K., France, Germany, the Netherlands, Poland, Japan, China, South Korea, Romania and the U.S. (Kshetri, 2011). KL has faced some challenges being that it is from an emerging country. It faced adversary from the beginning as the company started out without any external funding or investment capital. Russia’s intellectual property protection laws are
Pibrex used a decentralized structure worldwide. This structure was complicated and Russians did not easily adapt to it. Pibrex Region Europe North had many other subsidiaries besides Russia therefore issues in the Russian subsidiaries were often over looked. This limited progress and denied proper management of Pibrex Russia.
Cyber threats have increased dramatically over the past few years, with large companies such as Amazon, Netflex, PayPal, Wikipedia and most recently Equifax, experiencing high profile breaches. Traditional tools, defenses and responses have been strained with keeping up with the level and sophistication of an very organized and ubiquitous hacking community, which has coalesced into organized crime syndicates that the FBI and law enforcement continues to battle.
As previously stated, cybercrime is a market with exponential growth. Cyber attack written premium growth is expected to rise from $1 billion in 2015 to $5 billion in 2018. Scalable cyber insurance is important, as smaller business will likely increase as their vulnerabilities become more apparent to cyber hackers. However, coverage for the cybercrime market is in its early stages, making underwriting difficult as there is little data to base prices on. Through October 4, 2016, 725 data breaches have occurred, affecting more than 29 million records. Medical and healthcare breaches account for 37% of the breaches and 48% of the records affected. Travelers is positioned well to leverage opportunities during the demand surge of cyber protection among businesses. External cybersecurity risks will be the main driver of the cyber insurance market. External hackers breaking into company databases, adding ransomware and leaking private
Malware, as defined by the National Institute of Standards and Technology, “refers to a program that is covertly inserted into another program with the intent to destroy data, run destructive or intrusive programs, or otherwise compromise the confidentiality, integrity, or availability of the victim’s data, applications or operating system. (M. & K., 2013)” This is a threat to all companies with any type of internet access and/or electronic information storage. That is currently a large number of both small and big businesses.
KL (Kaspersky Lab) is a company headquartered in Russia that provides information technology (IT) security software such as anti-virus, anti-spam and network security software to protect computer users against viruses, hackers and spam. This company became Russia’s
An invisible war is raging between cybercriminals and those who wish to make the virtual world a safer place, but the laws that could change the tides of this war are being called into question. Cybercrimes are a virtual epidemic that is sweeping the online world with crimes constantly posing as a threat such as identity theft, hacking, cyberterrorism, and computer viruses. In order to combat cybercrime the U.S. government passed the Computer Fraud and Abuse Act (CFAA) that allowed prosecutors to charge cybercriminals for their cybercrimes. Cybercrimes laws implemented by the CFAA should be strengthened in order to deter harmful cybercrimes because cybercrime has effect corporations, people, and the government.
On March 2014, Several security experts and western intelligence believed, a sophisticated piece of spyware was injected on several government computers across the continent of Europe and North America, which is widely known as Turla also known as Snake or Uroburous, which is the most sophisticated ongoing cyber-espionage campaigns. This malware targeting major government and militaries’ system to obtains their sensitive information. The Kaspersky Lab’s researches found out, that the Epic Turla is the worst attack during that period. Researchers believed, that this is the product of a Russian government agency (Kaspersky Lab, 2014)
Ever since the internet has become a global phenomenon, governments, multinationals, businesses, corporations, institutions, entrepreneurs, and private individuals have been exposed to a number of cyber threats and cyber-attacks. Cyber war, cyber terror, cyber-attacks, or anything cyber has become a buzzword for any crime that occurs via the World Wide Web. Even United States of America (U.S.), the most powerful nation on earth, has not been able to stave off these virtual threats. With just a single click on the internet, unscrupulous hackers could delete or corrupt legions of files via sending malware such as worms, bugs, Trojan horse, and quarantine to their targets. This report aims to provide a trenchant overview on the growing harm of not teaching malware.
The growing number of cyber security threats has brought about a proliferation of businesses offering various forms of network protection solutions. This may
For communication, an SSL certificate is used to encrypt communication between Server and Client sides. EIS also implements TLS and DTLS for encrypted data transmission. For operating systems, Intel® McAfee secures embedded devices and automates the enforcement of software change-control policies, helping manufacturers ensure that their products and devices are protected from cyber threats and attacks. McAfee solutions span a wide range of technologies to address the above challenges, including application whitelisting, change management, and integrity.
By the year of 2016, investments in online security are expected to reach $86bn (Contu et al, 2012). Although this might seem a large sum of money, it is considered necessary since there is an increase in online risks from all over the world. Professional hackers develop malware on a global scale and on a 24/7 basis. Hackers have five objectives when spreading malware over the Internet: to infect/distribute, to steal, to persist, to control and for intelligence (Morris, 2010).
The rapid growth of computer technology has created new opportunities for criminals to exploit online vulnerabilities against information stored and transmitted over advanced communication networks. The future growth of the information technology is endangered from growing cyber threats. [1]
with 1,000 PCs or more now experience a virus attack every two to three months -
Cybercrime is a serious issue that the international community faces today, with risks such as theft, espionage, surveillance and sabotage, a very real and accessible threat exists. Cyber security can be defined as a cyber activity that may threaten the security of a system or its information (Threat report 2015). There are various state and non state actors that both participate, instigate and also defend for and against these risks to both manage and maintain security and safety for the nation it protects. This report will look into the various risks and the challenges each nation
This report will outline that it would be useful for our company to subsidize free distribution of anti-virus software to our home users. There will be analysis of the connection between the company 's network and home users and how this will help our company 's problems with viruses. I will discuss the other issues besides providing free software to home users that affect the network security of our firm. Additionally, I will describe the roles of top management/non-IT management, IT professionals, and end-users in maintaining network security. Finally, I will bring out the role that Robert Vamosi envisions for corporate customers relative to free antivirus software based on his article, “Antivirus software must be free,