Overview
Direct Answer
An attack vector is a specific technique, pathway, or vulnerability that an adversary exploits to breach a system's security controls and gain unauthorised access. It represents the methodological choice an attacker makes based on identified weaknesses in people, processes, or technology.
How It Works
An attacker first conducts reconnaissance to identify potential weaknesses—such as unpatched software, phishing susceptibility, or misconfigured cloud storage—then selects the most feasible method to exploit that weakness. The chosen vector becomes the operational channel through which malicious activity is delivered, whether through social engineering, network exploitation, or physical access, ultimately compromising confidentiality, integrity, or availability.
Why It Matters
Organisations must identify and prioritise remediation of attack vectors to reduce their overall risk exposure and comply with security standards. Understanding which vectors pose the greatest threat enables security teams to allocate limited resources effectively, reduce breach probability and associated financial and reputational costs.
Common Applications
In financial services, phishing remains a primary vector targeting employee credentials; in healthcare, ransomware leverages unpatched systems; cloud-native environments face misconfigured access controls as a principal vector. Threat modelling exercises systematically enumerate possible vectors for a given application architecture.
Key Considerations
Not all vectors present equal risk; likelihood and impact must be weighted together. An organisation's threat model and risk appetite determine which vectors warrant immediate mitigation versus monitoring or acceptance.
More in Cybersecurity
Breach and Attack Simulation
Offensive SecurityAutomated security testing that continuously simulates real-world attack scenarios against production environments to validate defensive controls and identify security gaps.
Cloud-Native Application Protection
Offensive SecurityAn integrated security platform that protects cloud-native applications across the full lifecycle, combining workload protection, configuration management, and runtime security.
Vulnerability Disclosure
Offensive SecurityThe practice of reporting security vulnerabilities to software vendors so they can be fixed before public exploitation.
Denial of Service Attack
Offensive SecurityAn attack designed to make a machine or network resource unavailable by overwhelming it with traffic.
Software Supply Chain Security
Security GovernancePractices and tools that protect the integrity of software components, dependencies, build pipelines, and distribution channels from compromise and tampering.
Biometric Authentication
Identity & AccessUsing unique biological characteristics like fingerprints, facial features, or iris patterns to verify identity.
Security by Design
Security GovernanceAn approach that integrates security considerations into every stage of the software development lifecycle.
Security Operations Centre
Defensive SecurityA centralised facility where security professionals monitor, detect, analyse, and respond to cybersecurity incidents.