Knowledge (XXG)

Attack vector

Source 📝

36: 294: 147:
Often, this is a multi-step process. For instance, malicious code (code that the user did not consent to being run and that performs actions the user would not consent to) often operates by being added to a harmless seeming document made available to an
156:) is executed and performs the abusive tasks it was programmed to execute, which may include things such as spreading itself further, opening up unauthorized access to the IT system, stealing or encrypting the user's documents, etc. 140:
is a specific path, method, or scenario that can be exploited to break into an IT system, thus compromising its security. The term was derived from the corresponding notion of
335: 159:
In order to limit the chance of discovery once installed, the code in question is often obfuscated by layers of seemingly harmless code.
253: 119: 57: 53: 100: 72: 144:. An attack vector may be exploited manually, automatically, or through a combination of manual and automatic activity. 79: 328: 46: 354: 226: 231: 190:: sending deceptive messages to end users to entice them to reveal confidential information, such as passwords. 86: 184:
exploiting networking protocol flaws to perform unauthorized actions at the other end of a network connection.
359: 364: 68: 321: 264: 141: 153: 152:. When the unsuspecting end user opens the document, the malicious code in question (known as the 133: 305: 206: 93: 277: 216: 167: 201: 348: 171: 177:
exploiting webpages and email supporting the loading and subsequent execution of
35: 17: 178: 293: 221: 187: 149: 301: 211: 27:
The path taken or method used by a security breach into an IT system
181:
or other types of scripts without properly limiting their powers.
29: 254:"The Ghost In The Browser Analysis of Web-based Malware" 309: 60:. Unsourced material may be challenged and removed. 329: 8: 336: 322: 120:Learn how and when to remove this message 244: 273: 262: 7: 290: 288: 58:adding citations to reliable sources 308:. You can help Knowledge (XXG) by 25: 292: 34: 45:needs additional citations for 252:Provos, Niels; McNamee, Dean. 1: 162:Some common attack vectors: 381: 287: 227:Vulnerability (computing) 232:Vulnerability management 304:-related article is a 272:Cite journal requires 174:was able to propagate. 54:improve this article 259:– via UseNix. 170:; this is how the 317: 316: 142:vector in biology 134:computer security 130: 129: 122: 104: 16:(Redirected from 372: 355:Computer viruses 338: 331: 324: 296: 289: 282: 281: 275: 270: 268: 260: 258: 249: 207:Email attachment 168:buffer overflows 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 18:Vector (malware) 380: 379: 375: 374: 373: 371: 370: 369: 345: 344: 343: 342: 286: 285: 271: 261: 256: 251: 250: 246: 241: 236: 217:Security hacker 197: 126: 115: 109: 106: 69:"Attack vector" 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 378: 376: 368: 367: 362: 360:Computer worms 357: 347: 346: 341: 340: 333: 326: 318: 315: 314: 297: 284: 283: 274:|journal= 243: 242: 240: 237: 235: 234: 229: 224: 219: 214: 209: 204: 202:Attack surface 198: 196: 193: 192: 191: 185: 182: 175: 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 377: 366: 365:Malware stubs 363: 361: 358: 356: 353: 352: 350: 339: 334: 332: 327: 325: 320: 319: 313: 311: 307: 303: 298: 295: 291: 279: 266: 255: 248: 245: 238: 233: 230: 228: 225: 223: 220: 218: 215: 213: 210: 208: 205: 203: 200: 199: 194: 189: 186: 183: 180: 176: 173: 169: 165: 164: 163: 160: 157: 155: 151: 145: 143: 139: 138:attack vector 135: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 310:expanding it 299: 265:cite journal 247: 172:Blaster worm 161: 158: 146: 137: 131: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 166:exploiting 349:Categories 239:References 179:JavaScript 110:March 2017 80:newspapers 222:Spamming 195:See also 188:phishing 150:end user 302:malware 212:Malware 154:payload 94:scholar 96:  89:  82:  75:  67:  300:This 257:(PDF) 136:, an 101:JSTOR 87:books 306:stub 278:help 73:news 132:In 56:by 351:: 269:: 267:}} 263:{{ 337:e 330:t 323:v 312:. 280:) 276:( 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Vector (malware)

verification
improve this article
adding citations to reliable sources
"Attack vector"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
computer security
vector in biology
end user
payload
buffer overflows
Blaster worm
JavaScript
phishing
Attack surface
Email attachment
Malware
Security hacker
Spamming
Vulnerability (computing)
Vulnerability management
"The Ghost In The Browser Analysis of Web-based Malware"
cite journal
help

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.