Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | May 2017 |
Last Sign in: | 188 Weeks Ago, 2 Days Ago |
Questions Answered: | 27237 |
Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
·        Explain two or three items that would improve perimeter security of a data center. Include how these would work and why they would be effective.
·        Explain the differences between prevention, detection, and deterrence in terms of physical security of a business.
·        How do the security principles of prevention, deterrence, detection, delay, response, and recovery work together in establishing physical security?
·        The Integrated Physical Security states, "optimum protection comes from three mutually supporting elements: physical security measures, operational procedures and procedural security measures." (p. 5) Explain your perspective on this.
·        Why is it important to protect the organization's utility services (power, water, gas, etc.) and environmental controls (HVAC)? Name one technique for improving security in this area.
·        Explain some of the physical security barriers that can be used to improve security. Include at least one example.
·        Name and explain two or three different methods for improving physical access controls for a facility.
·        How and why does the construction of a security facility make a difference in its security? Explain techniques for building a more secure facility.
·        Explain Crime Prevention Through Environmental Design (CPTED). Include how it has changed the concept of security today.
·        Explain the different types of area designations. What are the security requirements for each?
Â
PICK one of the above question
and write atleast one page
and atleast two references
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll