The Business of Hacking

해킹 비즈니스

The Business of Hacking -why

해킹 비즈니스

HPE의 Business of Hacking Report는 해커와 그 비즈니스를 공격하고 이용해 방해를 줄 수 있도록 강점과 약점을 밝혀내는 해킹 SWOT 분석입니다.

Understand hackers’ businesses to protect your own

이제 해커들은 체계적인 비즈니스로 진화해 왔습니다. 해커들이 활동하게 하는 동기는 수익이며, 해커들은 가장 적은 리스크로 가장 큰 ROI를 얻는 전략을 구사합니다. 해커가 경쟁사로서 운영하고 취급하는 방식을 이해하면 해커의 비즈니스로부터 여러분 회사를 보호할 수 있습니다.

해킹 비즈니스 정보

전문가들의 의견을 확인해보십시오.

(2분 48초)

The Business of Hacking

Hackers operate in organized businesses—with their own risks and profits. Understand the business of hacking. Learn how they’re organized and how they make their money, so you can plan your strategy to beat them.

(PDF 5393KB)

Most effective security strategies

Learn which cyber defenses are most effective. IDC analysts share their experiences working with organizations across the industry as each has fought back to disrupt the business of hacking and make their companies safer.

Get proactive—disrupt the business of hacking

A look back on the Timeline of Disruption

Disrupt hackers’ businesses. Drive their costs up and profits down by deploying cyber defenses that force them to change their attacks. This paper provides a history of cybercrime and shows how it has evolved in response to the defenses we mount.

(PDF 449KB)

A Brief History of Cyber crime

The timeline of disruption—the measures we take to defeat hacker attacks—follows the timeline of computing itself. View the infographic to see how cyber defenses have evolved to keep hackers looking for new ways to access and steal data.

(PDF 62 KB)

Understand your newest competitor

Do hackers really have businesses like yours? Yes they do—with the same profit motives and business functions. Watch the video to learn how hackers operate and why treating them like competitors lets you disrupt their businesses to protect yours.

(Video 14:42 minutes)

Resources

Analyst report

UBM: How to disrupt the business of hacking

(PDF 2523KB)

Online assessment

How Mature Are Your Security Operations?

Online assessment

Take the Software Security Assurance Self-assessment