CybersecurityOffensive Security

Attack Vector

Overview

Direct Answer

An attack vector is a specific technique, pathway, or vulnerability that an adversary exploits to breach a system's security controls and gain unauthorised access. It represents the methodological choice an attacker makes based on identified weaknesses in people, processes, or technology.

How It Works

An attacker first conducts reconnaissance to identify potential weaknesses—such as unpatched software, phishing susceptibility, or misconfigured cloud storage—then selects the most feasible method to exploit that weakness. The chosen vector becomes the operational channel through which malicious activity is delivered, whether through social engineering, network exploitation, or physical access, ultimately compromising confidentiality, integrity, or availability.

Why It Matters

Organisations must identify and prioritise remediation of attack vectors to reduce their overall risk exposure and comply with security standards. Understanding which vectors pose the greatest threat enables security teams to allocate limited resources effectively, reduce breach probability and associated financial and reputational costs.

Common Applications

In financial services, phishing remains a primary vector targeting employee credentials; in healthcare, ransomware leverages unpatched systems; cloud-native environments face misconfigured access controls as a principal vector. Threat modelling exercises systematically enumerate possible vectors for a given application architecture.

Key Considerations

Not all vectors present equal risk; likelihood and impact must be weighted together. An organisation's threat model and risk appetite determine which vectors warrant immediate mitigation versus monitoring or acceptance.

More in Cybersecurity