Skip to the main content.
Partner Programs
Already a Partner?
The Value of Partnership with Netenrich



1 min read

Difference between attack surface vs. attack vector

People often get the terms attack surface, and attack vector confused. Though these terms are relatedthey hold a different meaning altogether.   


What is an Attack Surface?

Attack surface is the sum of all the touchpoints on your network where an adversary can attempt to gain entry across your hardware, software, cloud, and network components. These components can include, 

  • Managed and unmanaged devices 
  • Cloud storage and apps 
  • IoT devices 
  • Wi-Fi access points and routers  
  • Servers 
  • VPN 
  • Firewalls 
  • SaaS solutions
  • Third-party vendors, and more. 

An organization’s attack surface constantly expands and shape-shifts in both physical and digital dimensions, making it quite a task to manage it. However, organizations can reduce the risk to their attack surface with continuous mapping and real-time visibility.  


What is an attack vector? 

An attack vector is the actual method that a threat actor uses to breach or infiltrate your network.  

Attack vectors may target weaknesses in your security and overall infrastructure, or they may even target the people in your organization.  

Some of the most used attack vectors are,

  • Man-in-the-middle 
  • Compromised credentials 
  • Weak and stolen credentials 
  • Malicious insider 
  • Missing or poor encryption 
  • Misconfiguration 
  • Ransomware 
  • Phishing 
  • Spear-phishing 
  • Zero-day vulnerability 
  • Physical theft 
  • Misused trust relationships, etc.
Resolution Intelligence Cloud dashboard showing alerts

27 min read

How to Implement MITRE’s World-class SOC Strategies with Resolution Intelligence Cloud

Implement MITRE’s recommended world-class SOC strategies using the Netenrich Resolution Intelligence Cloud platform.

Read More
Cog wheel with lines connected to it

6 min read

The Netenrich Guide to Cybersecurity Mesh Architecture (CSMA)

Implement an open mesh architecture for cybersecurity — and all digital operations.

Read More

7 min read

Netenrich Guide to Secure Operations

Secure operations — different from security operations and SOC — is a new approach to security and digital operations that strengthens cyber...

Read More