attack vector


Also found in: Dictionary, Thesaurus, Medical, Legal.

attack vector

The approach used to assault a computer system or network. A fancy way of saying "method or type of attack," the term may refer to a variety of vulnerabilities. For example, an operating system or Web browser may have a flaw that is exploited by a website. Human shortcomings are also used to engineer attack vectors. For example, a novice user may open an email attachment that contains a virus, and most everyone can be persuaded at least once in their life to reveal a password for some seemingly relevant reason. See attack, vulnerability and social engineering.
Mentioned in ?
References in periodicals archive ?
Random false data injection attacks: attacker aims to find any attack vector as long as it can lead to a wrong estimation of state variables
Portable Media Security: By extensively scanning any portable media such as USB sticks, CDs and DVDs for malware before they are allowed to connect to the secure network, as well as applying security policies to limit allowed file types and media devices, the portable media attack vector can be significantly minimized.
A growing attack vector, smartphones, tablets and other mobile devices have become essential business productivity tools.
If the attack vector is a linear combination of the column vectors of H, that is A = Hc, the residual test can be bypassed by the attacker.
The second attack vector is session hijacking which is achieved through malware.
Ironically, this old attack vector is seeing a comeback via flash drives.
Microsoft offered two workarounds, including one that disables icons from being displayed for shortcuts, and another that disables the WebClient service, blocking a possible remote attack vector.
This attack vector could have a major impact on the industry, immediately exposing corporations to a vast array of new security considerations that need to be dealt with.
However the company stated that machines would have to be infected with the trojan discovered by Boldewin first, in order for BITS to be exploited, and claimed it is not an attack vector for initial infection.
You've deployed solid network security products, which means today's attack vector of choice is through your applications," reports Michael Gavin in his January 3, 2006 research titled Application Firewalls - Are they Worth the investment?
Privileged Accounts Emerge as Primary Attack Vector for Cyber-Attackers; Session to Highlight How Enterprises can Mitigate the Privileged Account Risk
Core Security said that the acquisition will complement its suite of software solutions that manage security risk across the enterprise and protect against any attack vector on any type of device or operating system.