Google+

Friday, 18 April 2014

HACKERS,Hacking Your Systems

Hackers: How They Get In, How They Got In


The news of Intel acquisition of McAfee signals a change in how leaders in the 
technology infrastructure space see the role of security. The security model is 
moving from the client (PC’s, laptop’s etc) to a network-based model, where 
virtual desktops and mobile clients are secured in the cloud.   Intel is threatened
 when the number of logical machines start to outpace physical machines. As a
 result, Intel has to branch into new areas for its business and the cloud is a key 
priority. The cloud will not only be powered by tons of microprocessors, but think 
about Intel ‘virtual inside’ where security is at the epicenter of cloud computing. 
But how do security breaches happen? Where and how does the hacker get 
in and against what threats will companies like Intel be protecting us? Here is a 
graphical representation of how hackers penetrate and access company 
computers and networks; and the damage that is created. 


NOTE: BE SAFE

No comments:

Post a Comment