Pennsylvania State Techniques of Penetrating an Information System Paper
Question Description
Identify and describe two (2) non-technical and (2) technical tactics/techniques of penetrating an information system. How are they similar? How are they different from one another? Where (at what target) would these tactics be most effective? Describe an environment in which one of these tactics or techniques might be effective. Would any of them be effective in the environment highlighted from your current event in discussion 2.1? Why or why not?
The event I choose from discussion 2.1 is: https://www.cbsnews.com/news/marriott-data-breach-…