Attack Vectors

Attack vectors help unauthorized elements to exploit the vulnerabilities in the system or network, including the human element. Examples of attack vectors are email attachments, pop-up windows, deception, chat rooms, viruses, and instant messages. Attack surface The sum-total of points on a network where attacks can occur where an unauthorized user (the “attacker”) can try to manipulate or…


Vulnerability is a weakness that can be exploited by a cyber attack to gain unauthorized access to systems, or perform unauthorized actions on a computer system. Vulnerabilities can allow attackers to run code, access a system’s memory, install malware, and steal, destroy or modify sensitive data.

Cyber Hygiene

Cyber hygiene is the practices and steps that users of computers and other devices take to maintain system health and improve online security. These practices are often part of a routine to ensure the safety of identity and other details that could be stolen or corrupted. Much like physical hygiene, cyber hygiene is regularly conducted…

error: Content is protected !!