Systems and Security : Attacks, Threats, and Vulnerabilities
Vectors
1. Direct access
2. Wireless
3. Email
4. Supply chain
5. Social media
6. Removable media
7. Cloud
Vectors refer to the methods or channels through which a cyber attack can be launched. Some of the commonly used vectors are:
1. Direct access: This vector involves unauthorized access to a system or network through direct means such as a remote desktop connection, a virtual private network (VPN) connection, or physical access to a device.
2. Wireless: This vector involves accessing a network through wireless means such as Wi-Fi, Bluetooth, or NFC.
3. Email: This vector involves sending malicious emails to the target, which can contain phishing links, attachments, or malicious codes.
4. Supply chain: This vector involves compromising a vendor or third-party software to gain access to the target.
5. Social media: This vector involves using social media platforms to spread malicious content or steal sensitive information.
6. Removable media: This vector involves spreading malware through removable media such as USB drives, CDs, or DVDs.
7. Cloud: This vector involves compromising cloud-based systems, applications, or services.