Glossary

Attack vector


A


B


C


D


E


F


G


H


I


J


K


L


M


N


O


P


Q


R


S


T


U


V


W


X


Y


Z

    In cyber security, an attack vector is a path that a hacker takes to exploit cybersecurity vulnerabilities.

    • Infecting hundreds or thousands of computers with bots to establish a network, known as a botnet, to send spam, perform cyber attacks, steal data or mine cryptocurrency. The hacker can remotely access the bots from an off-site command-and-control server.
    • Customer data theft from target organizations that collect and store large amounts of personal data from their customers.
    • denial of service (DoS) attack overloads IT systems and leads to unplanned service outages.

    There are hackers with motivations other than money, such as those that want to leak secret information to the public, embarrass someone they disagree with, or make a political statement. However, for most IT organizations, the majority of cyber attacks will come from hackers that are trying to steal personal and financial data.

    The general methodology of exploiting attack vectors is the same:

    1. Hackers identify a target system that they wish to penetrate or exploit
    2. Hackers use data collection and observation tools such as sniffing, emails, malware or social engineering to obtain more information about the target
    3. Hackers use this information to identify the best attack vector, then create tools to exploit it
    4. Hackers break the security system using the tools they created, then install malicious software applications
    5. Hackers begin to monitor the network, stealing your personal and financial data or infecting your computers and other endpoint devices with malware bots

    Securing potential attack vectors against exploitation by hackers requires IT organizations to implement policies and procedures that prevent hackers from obtaining useful information about IT security vulnerabilities.

    What are common attack vectors in the IT infrastructure?

    These are the most common attack vectors used by hackers and how to mitigate them.

    • Phishing emails try to trick the recipient into giving up restricted information, often by presenting them with a link to a malicious website. While IT personnel may be savvy about verifying the contents of an email, members of the business may not be.
      Mitigation strategy: Encourage reporting of phishing emails and block known senders of malicious mail through a centralized email filter, to prevent users from being bombarded with phishing emails. Provide guidelines and tips for how to distinguish phishing emails from legitimate emails.
    • Malware is a catch-all term that describes any program that introduces malicious code into your IT infrastructure. Viruses, worms and trojans are all examples of Malware. Malware infections can spread throughout the IT infrastructure, creating a lot of overtime for IT SecOps teams and potentially compromising valuable data while impacting service availability.
      Mitigation strategy: Zero-day attacks are difficult to avoid, but maintaining an up-to-date antivirus and firewall can significantly reduce the probability of a successful virus attack against your organization.
    • Security vulnerabilities that are neglected by the IT organization, can be used as an attack vector.
      Mitigation Strategy: Regularly monitor all of your applications and servers for available patches, and perform updates as soon as possible to reduce your vulnerability.

    Monitor potential cyber attack vectors with Sumo Logic

    Sumo logic uses machine learning and big data analysis to deliver industry-leading IT security capabilities, including threat detection, incident response and forensic investigation. Sumo Logic obtains threat intelligence from CrowdStrike via an up-to-date IOC (Indicators of Compromise) database that contains the latest information on known threats and attack vectors. Learn more about Sumo Logic’s full-stack application monitoring and observability.