attack vector


Also found in: Dictionary, Thesaurus, Medical.

attack vector

The approach used to assault a computer system or network. A fancy way of saying "method or type of attack," the term may refer to a variety of vulnerabilities. For example, an operating system or Web browser may have a flaw that is exploited by a website. Human shortcomings are also used to engineer attack vectors. For example, a novice user may open an email attachment that contains a virus, and most everyone can be persuaded at least once in their life to reveal a password for some seemingly relevant reason. See attack, vulnerability and social engineering.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
Mentioned in ?
References in periodicals archive ?
The literature [1]-[6] mentions seven stages of a cyberattack, the combination of which is a fully realized attack vector. Attack stages reflect the harm done by the attacker against the victim: the early stages include processes for data collection, target tracking and attack infrastructure.
Let a = [[[a.sub.1], [a.sub.2], ..., [a.sub.n]].sup.T] represent an attack vector added to original measurement vector z = [[[z.sub.1], [z.sub.2], ..., [z.sub.m]].sup.T].
He advocates that establishing the appropriate Service Level Agreements (SLA) with a 'Trust (meets security responsibilities) and Verify (meets security requirements)' approach is an appropriate way to minimize attack vectors. This line of defense protects initial system vulnerabilities, around data loss, unauthorized access, encryption protocols, and disrupted availability for both the enterprise and the shop-floor.
For both situations, we think about two conceivable assault objectives: irregular false information infusion assaults, in which the assault means to discover any attack vector as long as it can prompt a wrong estimation of state variables, and focused on false information infusion strike, in which the attacker plans to discover an assault vector that can infuse discretionary blunders into certain state variables.
Our automated system works in real-time and over time regardless of the attack vector, device type or OS.
Glen Ogden, regional sales director, Middle East, at A10 Networks says that IPv6 introduces not just another attack vector but an attack volume - one that encompasses a parallel universe of all DDoS attacks known today.
"In 2014, mobile will become the attack vector of choice for cyber criminals, as the number of Android threats alone is expected to climb to more than 3 million.
Instead of relying on a single attack vector, malware will use whatever unprotected path exists to reach its target and accomplish its mission.
where [DELTA][z.sub.a] represents the malicious data measurements, and a is referred to as an attack vector. If the attack vector is a linear combination of the column vectors of H, that is A = Hc, the residual test can be bypassed by the attacker.
The attack vector was a mobile developer's website which a number of Facebook engineers visited on their laptops, with malware being downloaded in the background and infecting the machines.
Ironically, this old attack vector is seeing a comeback via flash drives.
Microsoft offered two workarounds, including one that disables icons from being displayed for shortcuts, and another that disables the WebClient service, blocking a possible remote attack vector.