Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Access Vector

Note: metric

Abbreviation(s) and Synonym(s):

None

Definition(s):

  reflects the access required to exploit the vulnerability.
Source(s): NISTIR 7864

  measures an attacker’s ability to successfully exploit a vulnerability based on how remote an attacker can be, from a networking perspective, to an information system.
Source(s): NISTIR 7946