Security and the Evolving Enterprise Needs
Sophistication of Hacker
Tools
1990
1980
Packet Forging/ Spoofing
Password Guessing
Self Replicating Code
Password Cracking
Exploiting Known Vulnerabilities
Disabling Audits
Back Doors
Hijacking Sessions
Sweepers
Sniffers
Stealth Diagnostics
Technical Knowledge Required
High
Low
2000
Previous slide
Next slide
Back to first slide
View graphic version