Definition[]
An intrusion vector is "the path or means an actor uses to gain access to a target."[1]
Overview[]
"Common intrusion vectors include emails sent with malicious links and attachments; fake or manipulated websites that download viruses; removable media such as USB drives; unsecured wireless hotspots; and access through weak passwords."[2]
References[]
- ↑ Australia's Cyber Security Strategy, at 17.
- ↑ Id.