Member-only story

Cyber Security: Attack Vectors

Jesse L
3 min readNov 14, 2021

--

Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of sensitive data that is being stored and transmitted digitally. This includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over different types of attack vectors to have a better understanding of where cyber attacks can come from. With this introduction out of the way, let’s get into it.

Direct Access

Direct access means that an attacker, or an actor with malicious intent, has physical access to machines and the network. Physical attacks can be reduced by adding security guards, allowing only certain individuals to have access to specific rooms and computers, and managing users network privileges. If an attacker successfully gains physical access, they can install malware which can do a number of things such as sabotage, losing control of the system, and stealing information.

Wireless Network

A number of cyber attacks can be carried out on wireless networks. Evil twins, a common attack that is used to eavesdrop on wireless communications, and rogue access points, an access point that is installed without authorization, can be placed.

Email

--

--

Jesse L
Jesse L

Written by Jesse L

Hi, I'm a passionate technology enthusiast and lifelong learner. Beyond my technical pursuits, I'm also passionate about sharing my enthusiasm with others.

No responses yet