Anattack vectoris the route or method used to compromise an environment, and it is typically described as the way athreat actorexploits avulnerabilityto gain unauthorized access, execute code, steal data, or disrupt services. To define an attack vector correctly, cybersecurity documents emphasize that you must identify both parts of that relationship:who or what is attackingandwhat weakness is being exploited. The “attacker” component represents the threat source or threat actor, including their capability and intent (for example, cybercriminals using phishing, insiders abusing access, or automated botnets scanning the internet). The “vulnerability” component is the specific weakness or exposure that enables success, such as a missing patch, weak authentication, misconfiguration, excessive permissions, insecure coding flaw, or lack of user awareness.
Without identifying the attacker, you cannot properly characterize the likely techniques, scale, and motivation driving the vector. Without identifying the vulnerability, you cannot define the practical entry point and control gaps that make the vector feasible. Together, attacker plus vulnerability allows defenders to map realistic scenarios, prioritize controls, and select mitigations that reduce likelihood and impact. Those mitigations may include patching, configuration hardening, strong authentication, least privilege, network segmentation, user training, and monitoring. The other options list technology elements that can be involved in an incident, but they do not capture the essential definition of an attack vector as an exploitation path driven by a threat actor leveraging a weakness