What is it?
the way in which an attack can propagate through an attack surface
the different vectors include:
- message-based threat vectors
- human vectors and social engineering
- wired network as a threat vector
- wireless network as a threat vector
- systems threat vector
- files and image threat vector
- removeable devices threat vector
- cloud
- supply chain
Why is it mentioned?
to defend from cybersecurity threats, understanding where the could come from on an attack surface, is critical.
related to attack vector score