5. Attack Vectors