Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?