Hacking Methods [Infography]

hackingIntel acquisition of McAfee reveals that how leaders in the technology infrastructure space see the role of security. The security model is moving from the client (PC’s, laptop’s etc) to a network-based model, where virtual desktops and mobile clients are secured in the cloud.Innumerably hackers and hacking techniques evolved and changed daily.Since the technologies like cloud computing has got a key priority and  not only merely be powered by tons of microprocessors but also security has to play a major role .But how do security breaches happen? Where and how does the hacker get in and against what threats will companies like Intel be protecting us?

Here is a graphical representation from wikibon.org of how hackers penetrate and access company computers and networks; and the damage that is created.Obviously there must be updated hacking techniques other than this info-graphic, however let’s prior common hacking techniques.




About Technology Timely

Aimed on updated tech news

Posted on March 11, 2011, in Infography, Security, Technews. Bookmark the permalink. Leave a comment.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: