Couple of interesting concept videos to show what happens when a server comes under attack.
This video is intended to be a high level (if not stylized) visualisation of the early stages of a cyber criminal compromising a VOIP system.
The concept here was simply to provide some ideas as to ways to represent their massive datasets visually.