attack vectors
Paths or methods that threat actors use to exploit vulnerabilities in information networks or systems from a concrete organisation and impact its availability, integrity and confidentiality. Attack vectors may include social engineering tactics such as phishing mails or pretexting, technical exploits as SQL injection as well as buffer overflow attacks.
Occupations using this skill
Showing up to 500 results. Essential first.
chief ICT security officer
chief information officer
chief technology officer
cyber incident responder
cybersecurity risk manager
digital forensics expert
ethical hacker
ICT auditor manager
ICT information and knowledge manager
ICT security technician
ICT system analyst
ICT technician
ICT network architect
ICT system developer
ICT system tester