What best describes an attack vector?