What is attack vector?
An attack vector is defined as the technique with which unauthorized access to a device or network can be obtained by hackers for nefarious purposes. In other words, it is used to attack or exploit a network, computer, or device. Attack vectors help unauthorized elements to exploit vulnerabilities in the system or network, including human elements.
Examples of attack vectors are email attachments, pop-up windows, deception, chat rooms, viruses, and instant messages. In most cases the programming is heavily involved and it is rare that hardware means that you are involved in an attack vector. Human ignorance or weaknesses are also used for technical attack vectors. In the case of deception, for example, users are tricked into weakening the system or network defenses. Antivirus software and firewalls could provide some defense or blocking attack vectors. However, a fully attack-proof technique is not currently available as hackers keep updating and updating their attack vectors.
Some of the mitigation techniques used against attack vectors are based on multilevel controls and defense in depth. Some of the measures include packet classification and marking, IP source trackers, traffic monitoring, TCP intercept, policy-based routing, firewalls, TCP intercept, network-based application detection, committed access rate and layer 3 switches.