attack vectors and patterns