- message-based threat vectors
- human vectors and social engineering
- image based threat vector
- file based threat vector
- vishing threat vector
- removable device threat vector
- ==vulnerable software threat vector
- unsecure networks threat vector
- port openings threat vector
- default credentials threat vector
- supply chain threat vector