Writing Homework Help

Campbellsville Cybersecurity Risks Vulnerabilities and Countermeasures Discussion

 

An IT infrastructure can be protected by many technical access controls, such as firewalls, intrusion prevention systems, and antivirus software. Proper user behavior also plays an important role in keeping an infrastructure safe.

Answer the following question(s):

If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls or applying social engineering techniques? Why?

Fully address the questions in this discussion; provide valid rationale or a citation for your choices