Skip to main content

Development of the World Cyber Security

  • Chapter
  • First Online:
World Internet Development Report 2017

Abstract

At present, cyber security is increasingly threatened by cyber attacks, crime and privacy disclosure, which are penetrating areas like politics, economy, culture and society. All countries are strengthening their attention to cyber security and have taken a series of actions in accordance with their own situation and the world Internet development to improve their capacity of cyber security assurance. (1) Cyber attacks are becoming more hidden but more destructive. Technically peacocking represented by CIH virus, Melissa and Code Red virus are replaced by purposeful and organized attacks represented by Worm.WhBoy.cw, Stuxnet and Ukraine Power Grid Incident. Governmental intervention is being deepened. (2) Web spoofing, DDoS, Trojan and botnet, and cybercrime are the major threats to cyber security. In 2016, at least 255,100 phishing attacks happened worldwide, an increase of over 10% in comparison with the number (230, 300) in 2015. Actually, the number in 2016 was unprecedentedly high. Every year, about 500 million host computers are attacked by botnets, 18 computers per second, resulting in a loss as high as US$110 billion. (3) Advanced persistent threats are becoming increasingly serious with great power of destruction, imperceptibility, durability and complexity, posing great threat to critical infrastructure of finance, business, communication and transportation, and national defense. (4) The number of ransom software attacks is growing explosively. By the end of 2016, such software had evolved into a family-like development mode, with 44,300 new varieties having been discovered and 114 countries having been affected. RaaS is developed into a black industrial chain. From 2016 to 2017, the market scale of the underground market of ransom software saw an increase of 2502%. (5) Large-scale data breach happens frequently, threatening the security of data from governments, businesses and individuals. From 2008 to 2016, over seven billion pieces of online ID information worldwide was embezzled, which indicates that every person’s information is embezzled once. The governmental data of Sweden, Mexico and the Philippines were disclosed, which should arouse the attention of all governmental sectors. (6) With the maturity of IoT and AI, the equipment of IoT and AI may be the major targets of cyber attacks. By the end of 2016, it had been discovered that 2526 control servers had controlled 1.254 million intelligent devices of IoT of the world. Therefore, we should attach equal importance to security and development and take actions in advance to prevent any attack. (7) The United States, Russia, China, Germany and Singapore have launched national cyber security strategies and established special organizations to strengthen the protection of critical infrastructure. They also enhance cyber content security supervision and promote the development of cyber security industries. (8) The position of cyber security has been elevated in the overall national security. Some countries have channeled cyber security into military security to enhance its importance. The United Sates has elevated Cyber Command to be the highest United Combatant Command. Germany and Israel have also founded their cyber commands to improve cyber military fighting capacity, which, at the same time, brings about new factors of instability of cyberspace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    APWG:Global Phishing Survey: Trends and Domain Name Use in 2016.

  2. 2.

    FBI: Business E-Mail Compromise-An Emerging Global Threat.

  3. 3.

    IT News Africa: South Africa is second most targeted for phishing attacks.

  4. 4.

    CNCERT: Report on China’s Internet Security (2016).

  5. 5.

    ENISA: APCERT Annual Report 2016.

  6. 6.

    ENISA: ENISA Threat Landscape Report 2016.

  7. 7.

    APWG: Phishing Activity Trends Report: 4th Quarter 2016.

  8. 8.

    ACSC: ACSC 2016 Cyber Security Survey.

  9. 9.

    NCSC: 2016–2017 Unclassified Cyber Threat Report.

  10. 10.

    KPMG: New Zealanders get hooked by phishing attacks.

  11. 11.

    LACNIC: Phishing Accounts for One Third of the Total Number of Incidents.

  12. 12.

    INCAPSULA: Global DDoS Threat Landscape Q2 2017.

  13. 13.

    MyCERT: MyCERT Incident Statistics.

  14. 14.

    Intralinks.Botnets.What are They? and How can You Protect Your Computer?.

  15. 15.

    Symantec: IoT Devices Increasingly Used to Carry out DDoS Attacks.

  16. 16.

    ACSC: ACSC 2016 Threat Report..

  17. 17.

    Spamhaus: DDoS and Virus Attacks on Spamhaus.

  18. 18.

    Trend Micro: Report on Cybersecurity and Critical Infrastructure in the Americas.

  19. 19.

    Internet Crime Complaint Center (IC3): 2016 Internet Crime Report.

  20. 20.

    CERT Australia: Cyber Crime & Security Survey Report 2013.

  21. 21.

    Microsoft: Case study: cybercrime escalating in New Zealand.

  22. 22.

    Qihoo 360: Research Report on APT in China (2016).

  23. 23.

    Antiy: Retrospect and Prospect of Cyber Security Threats (2016).

  24. 24.

    Kaspersky laboratory: Kaspersky Security Bulletin 2016.

  25. 25.

    Symantec: Internet Security Threat Report, ISTR, Volume 22.

  26. 26.

    Ponemon Institute: 2017 Cost of Data Breach Study: Global Overview.

  27. 27.

    CNCERT: General Description of China's Cyber Security in 2016.

  28. 28.

    Akamai: Q3 2017 State of the Internet Security Report.

  29. 29.

    Armis: The Attack Vector “BlueBorne” Exposes Almost Every Connected Device.

  30. 30.

    Gartne: The Internet of Things Installed Base Will Grow to 26 Billion Units By 2020.

  31. 31.

    IDC: Wearables Shipments to Reach 213.6 Million Units Worldwide in 2020 with Watches and Wristbands Driving Volume While Clothing and Eyewear Gain Traction.

  32. 32.

    Statista: Smart home-Statistics and Facts.

  33. 33.

    HIS: Smart City Devices to Top 1 Billion Units in 2025.

  34. 34.

    IDC: A Trillion-Dollar Boost: The Economic Impact of AI on Customer Relationship Management.

  35. 35.

    AI2: Training a Big Data Machine to Defend.

Author information

Authors and Affiliations

Consortia

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Publishing House of Electronics Industry, Beijing and Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chinese Academy of Cyberspace Studies. (2019). Development of the World Cyber Security. In: Chinese Academy of Cyberspace Studies (eds) World Internet Development Report 2017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-57524-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-57524-6_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-57523-9

  • Online ISBN: 978-3-662-57524-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics