36:
294:
147:
Often, this is a multi-step process. For instance, malicious code (code that the user did not consent to being run and that performs actions the user would not consent to) often operates by being added to a harmless seeming document made available to an
156:) is executed and performs the abusive tasks it was programmed to execute, which may include things such as spreading itself further, opening up unauthorized access to the IT system, stealing or encrypting the user's documents, etc.
140:
is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its security. The term was derived from the corresponding notion of
335:
159:
In order to limit the chance of discovery once installed, the code in question is often obfuscated by layers of seemingly harmless code.
253:
119:
57:
53:
100:
72:
144:. An attack vector may be exploited manually, automatically, or through a combination of manual and automatic activity.
79:
328:
46:
354:
226:
231:
190:: sending deceptive messages to end users to entice them to reveal confidential information, such as passwords.
86:
184:
exploiting networking protocol flaws to perform unauthorized actions at the other end of a network connection.
359:
364:
68:
321:
264:
141:
153:
152:. When the unsuspecting end user opens the document, the malicious code in question (known as the
133:
305:
206:
93:
277:
216:
167:
201:
348:
171:
177:
exploiting webpages and email supporting the loading and subsequent execution of
35:
17:
178:
293:
221:
187:
149:
301:
211:
27:
The path taken or method used by a security breach into an IT system
181:
or other types of scripts without properly limiting their powers.
29:
254:"The Ghost In The Browser Analysis of Web-based Malware"
309:
60:. Unsourced material may be challenged and removed.
329:
8:
336:
322:
120:Learn how and when to remove this message
244:
273:
262:
7:
290:
288:
58:adding citations to reliable sources
308:. You can help Knowledge (XXG) by
25:
292:
34:
45:needs additional citations for
252:Provos, Niels; McNamee, Dean.
1:
162:Some common attack vectors:
381:
287:
227:Vulnerability (computing)
232:Vulnerability management
304:-related article is a
272:Cite journal requires
174:was able to propagate.
54:improve this article
259:– via UseNix.
170:; this is how the
317:
316:
142:vector in biology
134:computer security
130:
129:
122:
104:
16:(Redirected from
372:
355:Computer viruses
338:
331:
324:
296:
289:
282:
281:
275:
270:
268:
260:
258:
249:
207:Email attachment
168:buffer overflows
125:
118:
114:
111:
105:
103:
62:
38:
30:
21:
18:Vector (malware)
380:
379:
375:
374:
373:
371:
370:
369:
345:
344:
343:
342:
286:
285:
271:
261:
256:
251:
250:
246:
241:
236:
217:Security hacker
197:
126:
115:
109:
106:
69:"Attack vector"
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
378:
376:
368:
367:
362:
360:Computer worms
357:
347:
346:
341:
340:
333:
326:
318:
315:
314:
297:
284:
283:
274:|journal=
243:
242:
240:
237:
235:
234:
229:
224:
219:
214:
209:
204:
202:Attack surface
198:
196:
193:
192:
191:
185:
182:
175:
128:
127:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
377:
366:
365:Malware stubs
363:
361:
358:
356:
353:
352:
350:
339:
334:
332:
327:
325:
320:
319:
313:
311:
307:
303:
298:
295:
291:
279:
266:
255:
248:
245:
238:
233:
230:
228:
225:
223:
220:
218:
215:
213:
210:
208:
205:
203:
200:
199:
194:
189:
186:
183:
180:
176:
173:
169:
165:
164:
163:
160:
157:
155:
151:
145:
143:
139:
138:attack vector
135:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
310:expanding it
299:
265:cite journal
247:
172:Blaster worm
161:
158:
146:
137:
131:
116:
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
166:exploiting
349:Categories
239:References
179:JavaScript
110:March 2017
80:newspapers
222:Spamming
195:See also
188:phishing
150:end user
302:malware
212:Malware
154:payload
94:scholar
96:
89:
82:
75:
67:
300:This
257:(PDF)
136:, an
101:JSTOR
87:books
306:stub
278:help
73:news
132:In
56:by
351::
269::
267:}}
263:{{
337:e
330:t
323:v
312:.
280:)
276:(
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.