- Confidentiality – protecting sensitive information from unauthorized users
- Integrity – protecting information from being tampered
- Availability – providing access to information when needed
http://images.slideplayer.com/26/8770150/slides/slide_52.jpg https://www.owasp.org/images/5/51/Malware_Attack_Vectors.png http://animagehub.com/wp-content/uploads/2016/09/attack-vector-6.png http://www.trusteer.com/sites/default/files/Blog%20Image%202.png http://www.trusteer.com/sites/default/files/ScreenShot1713.png https://eforensicsmag.com/attack-vector/
http://whatsnext.nuance.com/wp-content/uploads/VB-security.jpg https://media.licdn.com/mpr/mpr/shrinknp_800_800/AAEAAQAAAAAAAAOvAAAAJDk0NzA2M2M3LWUzMzgtNDA0NC1iNGM0LTIwYjEyNTc0MDI1MQ.png
http://3.bp.blogspot.com/-z_yzAorBfRc/UxQpjpRg8GI/AAAAAAAAALY/yJwaHOTap8w/s1600/AttackVectors.jpg




