Section 2.6 in the Smith textbook ( elementary information security 2nd edition) offers a list of 6 high-level security controls.
Pick two of them and describe how you personally experience those controls in use on personal, work, or school computer systems.
Then describe which of the 6 controls you believe is the easiest for an attacker to defeat, and why.
Please respond with your discussion post of at least 300 words