Skip to the main content.
Partner Programs
Already a Partner?
The Value of Partnership with Netenrich

The-Value-of-Partnership-with-Netenrich

 

1 min read

Difference between attack surface vs. attack vector

People often get the terms attack surface, and attack vector confused. Though these terms are relatedthey hold a different meaning altogether.   

 

What is an Attack Surface?

Attack surface is the sum of all the touchpoints on your network where an adversary can attempt to gain entry across your hardware, software, cloud, and network components. These components can include, 

  • Managed and unmanaged devices 
  • Cloud storage and apps 
  • IoT devices 
  • Wi-Fi access points and routers  
  • Servers 
  • VPN 
  • Firewalls 
  • SaaS solutions
  • Third-party vendors, and more. 

An organization’s attack surface constantly expands and shape-shifts in both physical and digital dimensions, making it quite a task to manage it. However, organizations can reduce the risk to their attack surface with continuous mapping and real-time visibility.  

 

What is an attack vector? 

An attack vector is the actual method that a threat actor uses to breach or infiltrate your network.  

Attack vectors may target weaknesses in your security and overall infrastructure, or they may even target the people in your organization.  

Some of the most used attack vectors are,

  • Man-in-the-middle 
  • Compromised credentials 
  • Weak and stolen credentials 
  • Malicious insider 
  • Missing or poor encryption 
  • Misconfiguration 
  • Ransomware 
  • Phishing 
  • Spear-phishing 
  • Zero-day vulnerability 
  • Physical theft 
  • Misused trust relationships, etc.
The Netenrich Guide to Autonomic Security Operations

The Netenrich Guide to Autonomic Security Operations

What exactly is Autonomic Security Operations (ASO), and why do many of the best minds in cybersecurity think it’s the future of security...

Read More
How to Implement MITRE’s World-class SOC Strategies with Resolution Intelligence Cloud

How to Implement MITRE’s World-class SOC Strategies with Resolution Intelligence Cloud

Implement MITRE’s recommended world-class SOC strategies using the Netenrich Resolution Intelligence Cloud platform.

Read More
The Netenrich Guide to Cybersecurity Mesh Architecture (CSMA)

The Netenrich Guide to Cybersecurity Mesh Architecture (CSMA)

Implement an open mesh architecture for cybersecurity — and all digital operations.

Read More