Explain how social engineering techniques are used to gain physical or logical access to computer resources.

Computer attack

1. Compare and contrast computer attack and abuse tactics.
2. Explain how social engineering techniques are used to gain physical or
logical access to computer resources.
3. Describe the different types of malware used to harm computers