According to the Internet security Company Rising "Rising 2011 Annual Enterprise Safety Report" shows that, in the page calculation, 2011, there are 199,665 corporate Web sites have been invaded, in which hackers successfully acquired a certain authority of the company, accounting for the overall proportion of more than 80%. In the traditional enterprise area, the vast majority of enterprises have occurred in the intranet security incidents, which encountered malicious code (viruses and trojans, etc.) the proportion of intrusion accounted for more than 50%, hacker attacks and infiltration accounted for 35%, phishing attacks and other forms of security incidents accounted for 10%.
With the continuous deepening of Internet applications and the growing wealth of services, internet security has become more and more attention, cloud computing technology in the security field is also beginning to show its power. Rising information security expert Tao said that cloud computing in the Internet security applications, on the one hand, can greatly improve the security of malicious code collection efficiency, this is the cloud killing.
The so-called cloud killing, is compared with the traditional way, through the network of a large number of clients on the Internet Software behavior anomaly monitoring, access to the Internet Trojan, malicious program of the latest information, pushed to the security vendors to automate the server Analysis and processing, and then the virus and Trojan solution distributed to each client. The more simple users, the more secure each user, because such a large group of users, enough to cover every corner of the internet, as long as a site is hanging horse or a new Trojan virus appears, it will be intercepted immediately.
On the other hand, cloud computing technology allows Internet security vendors to put the characteristics of the virus on the server, rather than in the past need to frequently update the user's local virus library, so that users can install security software in the smallest possible size, but also can quickly update, This is more important for mobile network terminals like smartphones. Data show that during the first half of 2011, smartphones were 2.5 times times more likely to experience malware infections than they did six months ago. Cloud killing is able to let the smartphone in the case of less traffic, as far as possible to the known and unknown viruses to guard against.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.