Attack vectors are paths attackers use to enter your network. Every vector is a potential entry point to monitor.
Network perimeter. Internet-facing services like web servers and VPNs.
Email. Phishing attachments and malicious links. The most common entry point.
Web applications. SQL injection, XSS, authentication bypasses.
Removable media. USB drives carrying malware.
Supply chain. Compromised vendors, software updates, or hardware.
Physical access. Attackers entering your building can plug into network ports.
Map your vectors. Prioritize based on exposure and business impact.