access control An IT infrastructure can be protected by many technical access controls, such as firewalls, intrusion prevention systems, and antivirus software. Proper user behavior also plays an important role in keeping an infrastructure safe.
Answer the following question(s):
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls or applying social engineering techniques? Why?
Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.