Designing Effective Physical Security

Please respond to the following:
• Outline three parameters that should be considered when designing and implementing physical security into the information protection scheme. Suggest two activities that could be performed to address these parameters and explain how.

• Suggest three activities that could be performed to ensure that physical security plans are adequate. Describe two measures that you could perform in order to evaluate the installed physical security.

 

Leave a Reply

Your email address will not be published. Required fields are marked *