In a direct-access attack, a person gains physical access to a computer and performs malicious actions including installing different types of devices to compromise security, like operating system modifications, software worms, keyloggers or covert listening devices. A direct access threat vector is when the attacker is able to directly control the targeted system. This can take place through direct physical contact with the system's keyboard or may occur through a remote access connection.