Clever Geek Handbook
📜 ⬆️ ⬇️

Attack vector (cybersecurity)

An attack vector is a sequence of actions or a means for obtaining unauthorized access to a secure information system [1] .

As possible vectors of attack on sensitive data, social engineering methods, exploiting known vulnerabilities of the operating system and applications, installing malicious code (for example keyloggers ) on users' workstations with access rights, etc. can be used. As a rule, the attack vector is not the only one , different attack vectors are not mutually exclusive, and the choice of a particular attack vector depends on the motivation and qualifications of the attackers, who most often rely on the most familiar and proven Wren methods. For example, cybercriminals with code development skills can rely on the creation and use of special software, hackers and crackers - on receiving information about user authentication methods (which are usually passwords), etc.

It has been noted that in recent years, the number, complexity and sophistication of observed cyber attacks has increased dramatically. Nevertheless, defects and vulnerabilities of modern operating systems of almost all types of Windows , Mac OS and Unix remain one of the dominant “suppliers” of vectors for attacking sensitive data. In addition to them, for remote access to databases with valuable information, the possibilities of manipulating SQL queries with the implementation of SQL code are also actively exploited. Often, emails with embedded hacker code, network phishing schemes, computer worms for searching and evaluating vulnerabilities, text documents with built-in macros that infect the system environment, DDOS attacks , etc. are often used as well. The goals and objectives of an attacker are greatly simplified if there are open ports on the victim’s computer, weak passwords are used for authorization, there is no firewall setting, etc. [2]

Notes

  1. ↑ D. S. Foster. Definition of attack vector // Protection against hacking: sockets, shell code, exploits. - M .: DMK-Press, 2006 .-- S. 596. - 784 p. - ISBN 5-9706-0019-9 .
  2. ↑ P. Lepkowski. Attack vector // Encyclopedia of Cybercrime / Samuel C. McQuade, III. - London: Greenwood Press, 2009. - P. 9-10. - ISBN 978-0-313-33974-5 .

Links

  • Encyclopedia attack vector by Kaspersky Lab
Source - https://en.wikipedia.org/w/index.php?title=Attack_Vector_(ciber security )&oldid = 98570153


More articles:

  • EMP-35
  • Pozdneev, Vladimir Alexandrovich
  • Fihoff, Valerie
  • International Center for Science and Technology
  • Kulaev, Nurpasha Aburkashevich
  • Boeing C-135 Stratolifter
  • Immaculate Conception (Murillo)
  • European Union Member States Average Wage List
  • Horgos (China)
  • Klaviorgan

All articles

Clever Geek | 2019