Identification should include, but not be limited to, the following:
- Vectors
- social media
- email campaign
- steganography
- digital billboards
- web-based advertising
- mobile devices
- unsecured wireless hotspots
- Marketing strategies based on perishable inventory (e.g., boarding passes, tickets to sports events)
Process/Skill Questions:
- What is an attack vector?
- What are some examples of marketing vectors?
- How can these vectors be protected against cyberattacks?