Every form of malware or exploit needs a vector, or path of infection, to become active. Even worms, which can cruise through a network and infect any systems they encounter, must be introduced somewhere. Understanding the vectors which malware uses is important when understanding risk and how to avoid contamination. The following pages will outline some of the most common vectors used by hackers: