Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Cyber attack vectors represent the pathways and techniques adversaries use to breach systems, steal data, and disrupt operations. Understanding these vectors isn't just about memorizing a list of threats—you're being tested on your ability to recognize how attacks exploit specific vulnerabilities, why certain defenses work against particular threats, and how different attack types relate to core cryptographic and security principles like confidentiality, integrity, and availability.
Each attack vector in this guide demonstrates a fundamental security concept: some exploit human psychology, others target software flaws, and still others undermine network communications. When you encounter these on an exam, don't just identify the attack—connect it to the underlying vulnerability it exploits and the defensive mechanisms that counter it. That's where the real points are.
These attacks target the weakest link in any security system: humans. Rather than breaking encryption or exploiting code vulnerabilities, attackers manipulate people into voluntarily surrendering credentials or access.
Compare: Phishing vs. Social Engineering—phishing is actually a subset of social engineering, specifically using digital communications. Broader social engineering includes in-person manipulation and voice calls (vishing). If an exam asks about attacks that bypass technical controls entirely, both qualify.
Malware represents code designed to compromise system confidentiality, integrity, or availability. Each malware type has distinct infection vectors and objectives, making classification essential for defense.
Compare: Ransomware vs. Other Malware—ransomware is technically a malware subtype, but its explicit monetization model and reliance on cryptographic encryption make it distinct. Exam questions may ask which attack type directly weaponizes cryptography against victims.
These attacks target data in transit, exploiting weaknesses in network protocols or overwhelming system resources. Cryptographic protections like TLS/HTTPS directly counter interception attacks, while availability attacks require infrastructure-level defenses.
Compare: MitM vs. DDoS—both are network-layer attacks, but they target different CIA principles. MitM compromises confidentiality and integrity of communications; DDoS attacks availability without accessing data. Defense strategies differ entirely: encryption for MitM, traffic filtering and redundancy for DDoS.
These attacks target vulnerabilities in software code, particularly web applications that process user input. The core principle: never trust user input without validation and sanitization.
Compare: SQL Injection vs. XSS—both are injection attacks exploiting insufficient input validation, but they target different layers. SQLi attacks the server-side database; XSS attacks client-side browsers. Input sanitization helps both, but SQLi specifically requires parameterized queries while XSS requires output encoding and Content Security Policies.
These attacks focus on obtaining or bypassing authentication mechanisms. Strong authentication practices—complex passwords, MFA, and rate limiting—form the primary defense layer.
Compare: Password Attacks vs. Zero-Day Exploits—password attacks exploit weak user practices and are largely preventable through policy enforcement. Zero-days exploit unknown software flaws and require proactive security architecture since specific defenses don't exist yet. Both bypass normal security controls but through fundamentally different mechanisms.
| Concept | Best Examples |
|---|---|
| Human-targeted attacks | Phishing, Social Engineering |
| Malicious code | Malware, Ransomware |
| Confidentiality attacks | MitM, SQL Injection, XSS, Password Attacks |
| Availability attacks | DDoS |
| Injection vulnerabilities | SQL Injection, XSS |
| Cryptography-related | MitM (defeated by), Ransomware (weaponizes) |
| Unknown/unpatched vulnerabilities | Zero-Day Exploits |
| Authentication bypass | Password Attacks, SQL Injection, Phishing |
Which two attack vectors specifically exploit insufficient input validation in web applications, and how do their targets differ?
Compare and contrast how MitM attacks and ransomware relate to cryptography—one is defeated by it, the other weaponizes it. Explain both relationships.
If an exam question asks which attacks target the "availability" component of the CIA triad, which attack vector is your strongest example, and why don't data-theft attacks qualify?
A company implements multi-factor authentication and strong password policies. Which attack vectors does this defend against, and which remain unaffected?
Explain why phishing is considered a subset of social engineering, and identify a social engineering technique that doesn't involve digital communications.