Network (AV: N) Adjacent Network (AV: A) Local (AV: L)
Attack Vector (AV)
Physical (AV: P)
Attack Complexity (AC) Metric Low (AC: L) High (AC: H)
Privileges Required (PR) None (PR: N) Low (PR: L) High (PR: H)
User Interaction (UI) None (UI: N) Required (UI: R)
Scope (S) Unchanged (S: N) Changed (S: R)
Confidentiality Impact (C) None (C: N) Low (C: L) High (C: H)
Integrity Impact (I) None (I: N) Low (I: L) High (I: H)
Availability Impact (A) None (A: N) Low (A: L) High (A: H)
The physical attack vector includes physical access to the
What is the physical attack vector?
system, such as accessing the device in person.
The local attack vector consists of the ability to manipulate
What is the local attack vector? the system with local access, such as by using a USB-con-
nected device.
The two categories of the network attack vector are adja-
What are the two categories of the network attack vector?
cent network and network.
What does 'Network (N)' refer to in the context of attack
Network (N) refers to connectivity from any location.
vectors?
Adjacent network (A) describes access via the same broad-
What does 'Adjacent network (A)' describe?
cast domain.
Network attacks include access to a system via the network
What actions are included in network attacks? and actions such as sending malicious data packets or
instructions.
The diflculty of the attack techniques used by a threat
What does attack complexity refer to?
actor.
What does low attack complexity indicate? A straightforward attack.