Attack vector


In computer security, an attack vector is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its security. The term was derived from the corresponding notion of vector in biology. An attack vector may be exploited manually, automatically, or through a combination of manual and automatic activity.
Often, this is a multi-step process. For instance, malicious code often operates by being added to a harmless seeming document made available to an end user. When the unsuspecting end user opens the document, the malicious code in question is executed and performs the abusive tasks it was programmed to execute, which may include things such as spreading itself further, opening up unauthorized access to the IT system, stealing or encrypting the user's documents, etc.
In order to limit the chance of discovery once installed, the code in question is often obfuscated by layers of seemingly harmless code.
Some common attack vectors: