An IT infrastructure can be protected by many technical access controls, such as firewalls, intrusion prevention systems, and antivirus software. Proper user behavior also plays an important role in keeping an infrastructure safe.
Answer the following question(s):
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls or applying social engineering techniques? Why?

Respuesta :

Answer:

I would prefer attacking through social engineering techniques

Explanation:

Social engineering attacks are more common these days and they are very sophisticated. The attacker must focus on entering the server of the company through use of psychological manipulation by sending links through emails or messages to the users. These links are sent with a subject line of urgency, fear, or similar emotions.  

ACCESS MORE
EDU ACCESS
Universidad de Mexico