Trends in Cybersecurity and NEC’s Commitment to Developing Solutions

Author(s): SUZUKI Mikio, YAMAI Tadanori, SUZUKI Tetsuya & MIYAUCHI Kouji  |  Published date:  Jan, 2008

<p style="text-align:justify;">Over the past few years, cyberattacks and cybercrime have become increasingly destructive and are now regarded as a significant social issue. Under these circumstances, the Japanese government has hammered out a number of policies aimed at boosting cybersecurity both in the public and private spheres. At NEC, we take the threat of cyberattacks very seriously and have developed a variety of technologies such as a cyberattack protection system and information leakage measurement platform to protect our own security. Most recently, we have begun to apply AI technology to detect and counter threats and are working diligently to acquire security intelligence. Drawing on the technologies we have developed and the information we have collected, as well as sophisticated security human resources, NEC is now able to offer a wide spectrum of security solutions. In this paper, we will take a closer look at trends in cybersecurity and explain in some detail the efforts NEC is undertaking in this area.</p><p style="text-align:justify;"><strong><span style="font-size:medium;color:#3300ff;">1. Introduction &mdash; Trends in Cybersecurity </span></strong></p><p style="text-align:justify;">The nature of cyberattacks is constantly in flux, always evolving to keep pace with the times. Initially, personal cyberattacks &mdash; such as email pranksters &mdash; were predominant. But as more and more of the world&rsquo;s business shifted online, cyberattacks grew in scope and ambition, targeting businesses, large organizations, critical infrastructure, and governments at the highest level, gradually becoming ever more sophisticated and complex. These attacks range from economically motivated to politically motivated and can include targeted attacks aimed at specific subjects who have expressed social or political opinions that differ from those of the attackers. These often take the form of distributed denial of service (DDoS) attacks in addition to the hacking of websites. On the more prosaic side, theft of credit card information and other personal information has become an almost daily occurrence, along with illegal remittances via Internet banking. As a consequence, cyberattacks have come to be recognized as an issue that society as a whole must confront.</p>

Download pdf