attack vector


Also found in: Dictionary, Thesaurus, Medical, Legal.

attack vector

The approach used to assault a computer system or network. A fancy way of saying "method or type of attack," the term may refer to a variety of vulnerabilities. For example, an operating system or Web browser may have a flaw that is exploited by a website. Human shortcomings are also used to engineer attack vectors. For example, a novice user may open an e-mail attachment that contains a virus, and most everyone can be persuaded at least once in their life to reveal a password for some seemingly relevant reason. See attack, vulnerability and social engineering.
Mentioned in ?
References in periodicals archive ?
Vulnerability research focused less on operating systems and server applications, instead centering around client-side applications as major attack vectors.
industrial equipment providers through a number of attack vectors.
In addition, the report sounds the alarm on the proliferation of crimeware toolkits as the leading attack vector on the web -- elaborating on the predictions about crimeware toolkits in Finjan's previous Q2 Report (http://finjan.
This multi-level attack vector will have taken time to organise, which leads Trusteer to believe that hackers are now monitoring bug disclosure lists on a regular basis, and then mobilising their resources very quickly to create new zero day exploits.
HALOCK's ATD analyzes these four attack vectors to provide a holistic view -- on and off of an organization's network -- using cutting-edge tools that evolve with today's current threats.
For example, for this report, we not only added two web application attack vectors to our analysis, we also examined the perceived threat posed by the onion router (Tor) traffic and even uncovered some new vulnerabilities in third-party WordPress plugins which are being published as CVEs," he said.
Anand Shringi, National Sales Manager, SMB and Consumer Products, India & Src, Trend Micro said, As mobile malware are expected to grow in 2014 and mobile will become an attack vector of choice for cybercriminals, securing the mobile device with up-to date security software is advisable.
According to Webroot research, up to 85 percent of all malware is now distributed via the Web, making these threats more pervasive than those delivered by e-mail, the traditional attack vector.
CryptoFlows dramatically simplify how networked applications are protected and accessed, permitting automatic role-based user access to sensitive applications while blocking the number one attack vector in recent major data breaches.
The addition of advanced malware technologies to Cisco Web and Email Security solutions, and Cognitive Threat Analytics to Cisco s Cloud Web Security, have expanded Cisco s ability to provide more threat-centric security solutions for its customers by expanding attack vector coverage by providing advanced malware protection everywhere a threat can manifest itself.
The initial attack vector was an older, vulnerable version of
Finally, business logic abuse, which results from criminals exploiting flaws in the business functionality of a website such as shopping cart, logins and file downloads, is another attack vector.