Hierarchy view
attack vectors
Description
Description
Method or pathway deployed by hackers to penetrate or target systems with the end to extract information, data, or money from private or public entities.
Alternative Labels
information security threats
ICT security threats
cybersecurity threats
Skill type
knowledge
Skill reusability level
sector specific skills and competences
Relationships
Broader concepts
Essential for
Optional for
Concept URI
Status
released