UNDERSTANDING ATTACK VECTOR: KEY INSIGHTS FOR CYBERSECURITY PROTECTION