Preview

Case Analysis Kaspersky Lab: from Russia with Anti-Virus

Powerful Essays
Open Document
Open Document
2770 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Analysis Kaspersky Lab: from Russia with Anti-Virus
Case Analysis
Kaspersky Lab: From Russia with Anti-virus

Industry Background: Software Security
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).
Chief concerns for this Industry are: Internet-based fraud, sophisticated viruses, illicit network access, and computer network sabotage. Software security includes issues such as accidental disclosures caused by flawed or debugged programs and the active or passive infiltration of computer systems Active infiltration includes activities such as obtaining unauthorized information fusing legitimate system access, gaining access through improper means of obtaining identification, or unauthorized physical access in order to gain access to systems. Passive infiltration includes wiretapping on data communications lines or databases and using concealed devices to transfer data in computers, databases, or data communications lines. (Gale, 2011)
Historically, information technology has had only basic security at best and highly vulnerable to attacks. In an effort to ward off cyber threats and capitalize from it, computer security companies began to market a wide range of services and products to prevent sabotage and unauthorized computer use. These security applications include virus detection and removal software, firewall support, encryption software, intrusion detection and analysis software, security consulting services, and even devices for user authentication (Gale, 2011).
Security software is a high growth market and is so mainly as a result of



Cited: “Computer Security.” Encyclopedia of Emerging Industries. Online Edition. Gale, 2011. Reproduced in Business and Company Resource Center. Farmington Hills, Mich.: Gale Group. 2011. http://galenet.galegroup.com/servlet/BCRC SFGate.com 2011. Global Smartphone Security Software Market to Reach $2.99 Billion by 2017, According to New Report by Global Industry Analysts, Inc., April 29, 2011, http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/04/29/prweb8354131.DTL Kaspersky Lab: From Russia with Anti-virus. Dr. Nir Kshetri, 2011. Prepared for use in International Marketing class. PRWeb.com 2011. Global Security Market to Reach $80.02 Billion by 2017, According to New Report by Global Industry Analysts, Inc., April 05, 2011, http://www.prweb.com/printer/8262390.htm Hoover’s. (2011, July 5). LABORATORIYA KASPERSKOGO ZAO. Hoover’s Company Records-In-Depth Records. Retrieved from LexisNexis Academic database. Quintura 2010. Kaspersky Lab Reaches Record Revenue in 2009, 03. 03. 10, http://blog.quintura.com/2010/03/03/kaspersky-lab-reaches-record-revenue-in-2009/

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    In a global economy, businesses thrive with good Information technology infrastructures. Information technology plays vital roles in successful businesses. Although tools like online advertising, and e-commerce can help businesses thrive in today’s global economy. However, this paper will focus on the importance of Information security functions within Ecolab’s IT organization. Furthermore, the impacts of information security functions from a business perspective will be discussed.…

    • 1661 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Security Dialogue 43(6) 495–512 © The Author(s) 2012 Reprints and permission: sagepub. co.uk/journalsPermissions.nav DOI: 10.1177/0967010612463488 sdi.sagepub.com…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of Information Security (3rd ed.). Boston: Course Technology-Cengage.…

    • 939 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Even if Kaspersky Lab’s revenue greatly and constantly increase since it was founded, it doesn’t perform in the same way in each branch of the anti-virus product market. This market can be segmented in different ways. First, it differs in the kind of client, depending if it is for consumers or for businesses. Products supply, distribution, marketing and prices are very different between both markets. Kaspersky Lab performs better in consumer market (3rd biggest vendor of IT security software in the world in 2010) than in the corporate one (world 5th largest…

    • 872 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays