Answer:
IT infrastructure
Step-by-step explanation:
and their IT infrastructure through physical security measures. There are two main ways of "hacking" a system. One is through a flaw in the software that is someone skilled enough can manipulate in order to gain access to the system and retrieve data or manipulate the system as they see fit. The second method is physically by accessing the IT infrastructure. If you were able to do so and there are no physical security measures you could simply plug into the infrastructure and access all the information that you want because you would be completely bypassing the digital security measures by doing so. That is why physical security measures are placed so that only qualified and vetted individuals have access to the infrastructure.