{"id":26221,"date":"2022-03-21T14:58:00","date_gmt":"2022-03-21T13:58:00","guid":{"rendered":"https:\/\/perseus.de\/attack-vector\/"},"modified":"2026-03-27T12:21:34","modified_gmt":"2026-03-27T11:21:34","slug":"attack-vector","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/attack-vector\/","title":{"rendered":"Attack vector"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26221\" class=\"elementor elementor-26221 elementor-22088\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-df1d412 e-con-full e-flex e-con e-child\" data-id=\"df1d412\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Attack vector<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53a64bcb e-flex e-con-boxed e-con e-parent\" data-id=\"53a64bcb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-623b76be e-con-full e-flex e-con e-child\" data-id=\"623b76be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><p data-start=\"52\" data-end=\"306\">An <strong data-start=\"56\" data-end=\"74\">attack vector<\/strong> refers to the <strong data-start=\"90\" data-end=\"114\">path or method<\/strong> used to launch a cyber attack on a system or company. It is the gateway that attackers use to gain <strong data-start=\"238\" data-end=\"293\">unauthorized access to data, networks or systems<\/strong>. <\/p><h3 data-start=\"313\" data-end=\"344\"> <\/h3><h3 data-start=\"313\" data-end=\"344\">What does that mean in detail?<\/h3><p data-start=\"346\" data-end=\"478\">Attack vectors can affect both <strong data-start=\"377\" data-end=\"406\">technical vulnerabilities<\/strong> and <strong data-start=\"416\" data-end=\"442\">human behavior<\/strong>. Typical examples are <\/p><ul data-start=\"480\" data-end=\"903\"><li data-start=\"480\" data-end=\"559\"><p data-start=\"482\" data-end=\"559\"><strong data-start=\"482\" data-end=\"502\">Phishing emails<\/strong>: users are tricked into revealing passwords<\/p><\/li><li data-start=\"560\" data-end=\"640\"><p data-start=\"562\" data-end=\"640\"><strong data-start=\"562\" data-end=\"578\">Open ports<\/strong>: Services that can be accessed unprotected via the Internet<\/p><\/li><li data-start=\"641\" data-end=\"725\"><p data-start=\"643\" data-end=\"725\"><strong data-start=\"643\" data-end=\"673\">Vulnerabilities in software<\/strong>: e.g. outdated operating systems or applications<\/p><\/li><li data-start=\"726\" data-end=\"796\"><p data-start=\"728\" data-end=\"796\"><strong data-start=\"728\" data-end=\"755\">Stolen access data<\/strong>: through leaks or insecure passwords<\/p><\/li><li data-start=\"797\" data-end=\"846\"><p data-start=\"799\" data-end=\"846\"><strong data-start=\"799\" data-end=\"818\">Malware attachments<\/strong> in emails or downloads<\/p><\/li><li data-start=\"847\" data-end=\"903\"><p data-start=\"849\" data-end=\"903\"><strong data-start=\"849\" data-end=\"874\">Infected USB sticks<\/strong> or other external devices<\/p><\/li><\/ul><h3 data-start=\"910\" data-end=\"948\"> <\/h3><h3 data-start=\"910\" data-end=\"948\">Where do I encounter this in everyday SME life?<\/h3><p data-start=\"950\" data-end=\"1036\">Attack vectors often occur in the everyday life of small and medium-sized enterprises (SMEs):<\/p><ul data-start=\"1038\" data-end=\"1263\"><li data-start=\"1038\" data-end=\"1088\"><p data-start=\"1040\" data-end=\"1088\">When employees <strong data-start=\"1059\" data-end=\"1088\">open unchecked attachments<\/strong><\/p><\/li><li data-start=\"1089\" data-end=\"1136\"><p data-start=\"1091\" data-end=\"1136\">If there is <strong data-start=\"1096\" data-end=\"1121\">no patch management<\/strong> <\/p><\/li><li data-start=\"1137\" data-end=\"1200\"><p data-start=\"1139\" data-end=\"1200\">When <strong data-start=\"1144\" data-end=\"1183\">passwords<\/strong> are used <strong data-start=\"1144\" data-end=\"1183\">multiple times and unsecured<\/strong> <\/p><\/li><li data-start=\"1201\" data-end=\"1263\"><p data-start=\"1203\" data-end=\"1263\">When external service providers use <strong data-start=\"1230\" data-end=\"1256\">insecure connections<\/strong> <\/p><\/li><\/ul><h3 data-start=\"1270\" data-end=\"1290\"> <\/h3><h3 data-start=\"1270\" data-end=\"1290\">Protective measures:<\/h3><ul data-start=\"1292\" data-end=\"1591\"><li data-start=\"1292\" data-end=\"1371\"><p data-start=\"1294\" data-end=\"1371\"><strong data-start=\"1294\" data-end=\"1327\">Sensitization and training<\/strong> of employees (e.g. against phishing)<\/p><\/li><li data-start=\"1372\" data-end=\"1437\"><p data-start=\"1374\" data-end=\"1437\"><strong data-start=\"1374\" data-end=\"1405\">Current security updates<\/strong> for all systems and software<\/p><\/li><li data-start=\"1438\" data-end=\"1478\"><p data-start=\"1440\" data-end=\"1478\"><strong data-start=\"1440\" data-end=\"1476\">Firewall and network monitoring<\/strong><\/p><\/li><li data-start=\"1479\" data-end=\"1538\"><p data-start=\"1481\" data-end=\"1538\"><strong data-start=\"1481\" data-end=\"1536\">Strong passwords and two-factor authentication<\/strong><\/p><\/li><li data-start=\"1539\" data-end=\"1591\"><p data-start=\"1541\" data-end=\"1591\"><strong data-start=\"1541\" data-end=\"1591\">Access rights according to the &#8220;need to know&#8221; principle<\/strong><\/p><\/li><\/ul><p data-start=\"1598\" data-end=\"1746\" data-is-last-node=\"\" data-is-only-node=\"\"> <\/p><p data-start=\"1598\" data-end=\"1746\" data-is-last-node=\"\" data-is-only-node=\"\"> <\/p><p data-start=\"1598\" data-end=\"1746\" data-is-last-node=\"\" data-is-only-node=\"\"><strong data-start=\"1598\" data-end=\"1607\">Conclusion<\/strong>: Every attack vector is a potential weak point. Recognizing and securing them significantly reduces the risk of cyber attacks. <\/p><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89aaf93 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"89aaf93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Attack vector An attack vector refers to the path or method used to launch a cyber attack on a system or company. It is the gateway that attackers use to gain unauthorized access to data, networks or systems. What does that mean in detail? Attack vectors can affect both technical vulnerabilities and human behavior. Typical [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"tags":[],"class_list":["post-26221","post","type-post","status-publish","format-standard","hentry","category-cyber-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attack vector - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/attack-vector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attack vector - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Attack vector An attack vector refers to the path or method used to launch a cyber attack on a system or company. It is the gateway that attackers use to gain unauthorized access to data, networks or systems. What does that mean in detail? Attack vectors can affect both technical vulnerabilities and human behavior. Typical [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/attack-vector\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-21T13:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T11:21:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Attack vector\",\"datePublished\":\"2022-03-21T13:58:00+00:00\",\"dateModified\":\"2026-03-27T11:21:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/\"},\"wordCount\":215,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyber Glossary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/\",\"name\":\"Attack vector - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-03-21T13:58:00+00:00\",\"dateModified\":\"2026-03-27T11:21:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/attack-vector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attack vector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attack vector - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/attack-vector\/","og_locale":"en_US","og_type":"article","og_title":"Attack vector - Perseus Technologies","og_description":"Attack vector An attack vector refers to the path or method used to launch a cyber attack on a system or company. It is the gateway that attackers use to gain unauthorized access to data, networks or systems. What does that mean in detail? Attack vectors can affect both technical vulnerabilities and human behavior. Typical [&hellip;]","og_url":"https:\/\/perseus.de\/en\/attack-vector\/","og_site_name":"Perseus Technologies","article_published_time":"2022-03-21T13:58:00+00:00","article_modified_time":"2026-03-27T11:21:34+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/attack-vector\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/attack-vector\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Attack vector","datePublished":"2022-03-21T13:58:00+00:00","dateModified":"2026-03-27T11:21:34+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/attack-vector\/"},"wordCount":215,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/attack-vector\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyber Glossary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/attack-vector\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/attack-vector\/","url":"https:\/\/perseus.de\/en\/attack-vector\/","name":"Attack vector - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/attack-vector\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/attack-vector\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-03-21T13:58:00+00:00","dateModified":"2026-03-27T11:21:34+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/attack-vector\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/attack-vector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/attack-vector\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/attack-vector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Attack vector"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26221"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26221\/revisions"}],"predecessor-version":[{"id":26222,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26221\/revisions\/26222"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}