KnowledgeDigital
attack vectors
Paths or methods that threat actors use to exploit vulnerabilities in information networks or systems from a concrete organisation and impact its availability, integrity and confidentiality. Attack vectors may include social engineering tactics such as phishing mails or pretexting, technical exploits as SQL injection as well as buffer overflow attacks.
Alternative Names
information security threatscybersecurity threatsICT security threats
Essential for these occupations
attack vectors is listed as an essential skill for 12 occupation(s).
Optional for these occupations
attack vectors is a useful but optional skill for 3 occupation(s).
Do you have this skill?
Take our free skill gap assessment to find out how your profile matches occupations that require attack vectors.