A possible method of attack.
List
- Message-Based Attack Vector
- Image-Based Attack Vector
- File-Based Attack Vector
- Voice Call Attack Vector
- Removable Device Attack Vector
- Vulnerable Software Attack Vector
- Legacy Applications
- Unsecure Network Attack Vector
- Open Service Port Attack Vector
- Default Credentials
- Supply Chain
- Social Engineering