statistics

7 September 2015 at 4:13pm
The attached document is a report based on the usage statistics of the streaming servers. If you have any questions, please email Emma.Smith@jisc.ac.uk or Tim.Boundy@jisc.ac.uk.
14 October 2014 at 1:33pm
These statistics only relate to information collated by Janet CSIRT and do not provide an accurate sample of security activity across the research and education sectors. The figures are frequently more closely correlated to the activity of CSIRT and our detection of events rather than their actual rates of incidence. For example: a successful investigation by researchers into a botnet will cause that month's malware figures to rise even though the malware may have been active in previous months.
16 June 2014 at 11:07am
These statistics only relate to information collated by Janet CSIRT and do not provide an accurate sample of security activity across the research and education sectors. The figures are frequently more closely correlated to the activity of CSIRT and our detection of events rather than their actual rates of incidence. For example: a successful investigation by researchers into a botnet will cause that month's malware figures to rise even though the malware may have been active in previous months.
22 May 2014 at 11:17am
These statistics only relate to information collated by Janet CSIRT and do not provide an accurate sample of security activity across the research and education sectors. The figures are frequently more closely correlated to the activity of CSIRT and our detection of events rather than their actual rates of incidence. For example: a successful investigation by researchers into a botnet will cause that month's malware figures to rise even though the malware may have been active in previous months.
15 April 2014 at 4:01pm
Category Count Compromise 16 Copyright 3 Denial of Service 18 General Query 4 LEA Query 2 Legal/Policy Query 0 Malware 519 Net/Security Query 5 Other 7 Phishing 19 Scanning 9 Social Engineering 1
13 March 2014 at 3:38pm
Category Count Compromise 111 Copyright 7 Denial of Service 61 General Query 7 LEA Query 2 Legal/Policy Query 1 Malware 380 Net/Security Query 15 Other 11 Phishing 27 Scanning 10 Social Engineering 0
6 February 2014 at 9:55am
Category Count Compromise 9 Copyright 1 Denial of Service 149 General Query 9 LEA Query 4 Legal/Policy Query 1 Malware 422 Net/Security Query 19 Other 17 Phishing 30 Scanning 15 Social Engineering 0
21 January 2014 at 8:42am
Category Count Compromise 152 Copyright 2 Denial of Service 16 General Query 6 LEA Query 1 Legal/Policy Query 1 Malware 618 Net/Security Query 4 Other 11 Phishing 14 Scanning 14 Social Engineering 0
3 December 2013 at 4:40pm
Category Count Compromise 366 Copyright 2 Denial of Service 14 General Query 9 LEA Query 4 Legal/Policy Query 0 Malware 544 Net/Security Query 2 Other 12 Phishing 95 Scanning 20 Social Engineering 1
6 November 2013 at 9:27am
Category Count Compromise 6 Copyright 4 Denial of Service 12 General Query 4 LEA Query 2 Legal/Policy Query 0 Malware 778 Net/Security Query 2 Other 21 Phishing 34 Scanning 22 Social Engineering 1
Subscribe to statistics