The path or method a threat uses to reach a target system, user, application, or workload.
An attack vector is the path or method a threat uses to reach a target system, user, application, or workload. In plain language, it is the route through which an attacker, malicious file, or unsafe action gets close enough to cause harm.
Attack vectors matter because defenders do not protect systems in the abstract. They protect the practical ways a threat could realistically arrive, spread, or gain influence.
They also matter because different attack vectors require different controls. Email filtering helps with one route, strong identity controls help with another, and segmentation helps with yet another. Thinking clearly about vectors helps teams choose the right defensive layer instead of relying on generic protection language.
Attack vectors appear in threat modeling, incident review, vulnerability management, phishing defense, and network or identity design. Security teams use the term when they need to explain how a danger becomes practical in a real environment.
It connects closely to Attack Surface, Attack Path, Threat, Vulnerability, Phishing, and Network Segmentation.
Security teams often use the term when explaining how a problem moved from possible to practical: not only that a weakness exists, but how someone could realistically reach it.
A company identifies malicious email attachments, exposed remote-access portals, and overprivileged service accounts as three different attack vectors into its environment. Each one leads to a different defensive response because the route into the problem is different even if the business impact could be similar.
An attack vector is not the same as a Threat. A threat is the danger or adversarial force, while the attack vector is the route it uses.
It is also different from Vulnerability. A vulnerability is the weakness being abused, while the attack vector is how the threat reaches that weakness.
It is also not the same as an Attack Path. A vector is often one route or entry method, while an attack path usually describes a broader chain of steps through the environment.