Appendix A

Threats and attacks
Threat vectors:
An entry point or media that an attacker can use to carry out an attack.
Attack types:
Names given to common methods of disrupting, degrading, destroying, or denying access to a system or resource. Can also be the name of a method that is used to collect data and information.
802.11 Wireless
CD ROM/DVD ROM
Bluetooth
Cloud computing
Email
Files
Instant messaging
Internet connectivity
Malicious proxy
NFC scanning
Onion routing networks
P2P
QR scanning
Remote access
Rogue tunnels
Social engineering
Social networking sites
Terminal services
USB storage devices
Voice over IP
Web browser
Web page
Backdoors
Botnets
Buffer overflow
Cache poisoning
Cross site scripting
DDOS
DNS reflection
DOS
Eavesdropping/sniffing ...

Get Designing and Building Security Operations Center now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.