Digital data has to be physically located somewhere i.e. country, state, building, servers with access control. Which require perimeter and internal controls. Without physical control the data stored on them is vulnerable as malicious people can do whatever they want from destroying it, altercation, disclose it. Physical controls are your first line of defense.
You work as an independent consultant within physical security, you are hired to choose a location for an IT start company that just received a multi-million dollar government contract to provide cloud services. Although the company will handle non-sensitive information you will provide consultations as the information was sensitive.
Task and Tips:

You are to research a real location, a building that is for sale
Cost of the building?
Will you use security guards?

What area will they monitor?

What perimeter controls will be used
What internal controls will be implemented

Tips:

Google Earth to see the physical layout,
Zillow 3D is helpful.
FEMA Perimeter Security Design

The post Perimeter Security Design appeared first on Homework Aider.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"