Once an intrusion is successful this is how hackers spread their control
Study: Trustwave 2012 Global Security Report Date: February 9 2012 After achieving an initial point of compromise, commonly referred to as a 'foothold' or a 'beachhead,' attackers work to identify additional targets on the compromised network, and propagate the intrusion. In 2011 the top three methods of propagation were:
<-- Back to Authentication Statistic Index |