80.9k views
2 votes
An IT infrastructure can be protected by many technical access controls, such as firewalls, intrusion prevention systems, and antivirus software. Proper user behavior also plays an important role in keeping an infrastructure safe.

Answer the following question(s):
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls or applying social engineering techniques? Why?

1 Answer

1 vote

Answer:

I would prefer attacking through social engineering techniques

Step-by-step explanation:

Social engineering attacks are more common these days and they are very sophisticated. The attacker must focus on entering the server of the company through use of psychological manipulation by sending links through emails or messages to the users. These links are sent with a subject line of urgency, fear, or similar emotions.

User Clauric
by
3.1k points