Home > Cybersecurity > 10 most common cyber-attack vectors and defence measures
The tactics used by malicious actors seeking to promote cyber attacks vary. They often exploit misconfigurations, weak controls and other cybersecurity malpractices that facilitate unauthorised access to victims’ systems.
A paper co-authored by cyber security officials from the United States, Canada, New Zealand, the Netherlands and the United Kingdom, released by the US Cybersecurity and Infrastructure Agency (CISA), brought together both the main tactics used to breach networks and methods that can be adopted to mitigate the risks of attacks.
The most common exploitation tactics usually seek:
In addition to listing these attack vectors, the CISA document also recommends practices that can help strengthen defences against the most exploited weak security controls: