Concept Flow - Attack surfaces and vectors
Identify System Components
List Possible Entry Points
Classify Entry Points as Attack Surfaces
Analyze How Attackers Can Use These (Vectors)
Implement Security Measures to Reduce Surfaces
Monitor for Attack Attempts on Vectors
System Secured
This flow shows how we find parts of a system that attackers can target (attack surfaces), understand how they might attack (vectors), and then protect the system.