Common Attack Vectors And Security Controls