The IT Law Wiki
Advertisement

Definition[]

An intrusion vector is "the path or means an actor uses to gain access to a target."[1]

Overview[]

"Common intrusion vectors include emails sent with malicious links and attachments; fake or manipulated websites that download viruses; removable media such as USB drives; unsecured wireless hotspots; and access through weak passwords."[2]

References[]

Advertisement