What physical security elements did you see

Assignment Help Computer Engineering
Reference no: EM132248295

Question: Write a 10 page paper describing the Physical Security of 2 Locations in the city or area where you live and submit the completed paper during the residency weekend. This is NOT an APA paper so References and Citations are not required.

Find 2 Physical Locations within your community (Hospital, Businesses, Warehouses, Storage Units, your local bank, etc.) and do a quick "visual" walk-thru of the facility.

As an example, if you chose a hospital, walk-thru the public areas and make some mental notes. Use caution - do NOT enter restricted areas and take care that you do not appear to be a threat.

What physical security elements did you see? What physical security elements did you not see? What physical security elements do you think exist even if you didn't see them? What are the critical assets they protect. What level of physical security would be needed to effectively protect those assets?

In some cases, you might consider talking with the facility management to let them know you are completing an assignment dealing with Physical Security and see if the manager would be willing to talk with you about their physical security. Speaking with management is NOT a requirement.

The goal of this assignment is to think about what you did and did not see and consider whether the facility measures up to "what you think the textbook" considers is needed to effectively support its Physical Security needs.

Reference no: EM132248295

Questions Cloud

Explain what is ethical and legal issues in personal selling : Explain what is ethical and legal issues in personal selling. Describe following in sales management in relation to ethical and legal issues in personal selling
Society imprison drug users for long periods of time : Why should society imprison drug users for long periods of time? What meaningful steps can society take to educate people and alleviate drug addiction problems.
Determine which is the preferred operating system : Conduct research to determine which is the preferred operating system to implement cloud computing, explain why (there is not a right or wro ng answer).
Prove the given equation : A vertical post stands on a horizontal plane. The angle of elevation of the top is 60o and that of a point x metre be the height of the post, then prove
What physical security elements did you see : What physical security elements did you see? What physical security elements did you not see? What physical security elements do you think exist even.
How will the new division conduct employee evaluations : A human resource plan will allow the director of the new Asia division to identify the future human resource needs for the organization.
Define what is the current cyber security-related situation : What is the current cyber security-related situation involving the topic you chose? What do you predict will happen in the future regarding your topic?
Describe a process or procedure that you found interesting : Describe a process or procedure that you found interesting and describe how it relates to operations management.
In the context of the situational leadership model : In the context of the situational leadership model, task behavior measures. In the context of the path goal theory, which of the following statements is true?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define and initializes three pointers

Display on the screen the addresses stored in those pointers each one in three different forms: octal, decimal and hexadecimal formats.

  How many packets can be sent before transmitter has to stop

If a 7-bit sliding window size is used, how many packets can be sent before the transmitter has to stop and wait for an acknowledgment?

  What are the source and destination port numbers

What are the source and destination port numbers in the UDP packet sent from the UDP server to the UDP client?

  Summarize a customer success story of an organization

In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the company chose to deploy a knowledge management system.

  Define how does web change security for the internet

Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security.

  Inputs the worlds population at the end of last year

Write a C++ program that inputs the world's population at the end of last year. Assume population is growing at a rate of 1.12%.

  What are the contents of register a after the execution

What are the contents of the stack, SP register at the end of the following program segment? LDS #$01FF PSHA PSHB PSHY

  Questionemployee ssn name dno pid saldepartment dno dname

questionemployee ssn name dno pid saldepartment dno dname mgrid ...project pid startdate enddate ...and the following

  Write an exception class named invalidtestscore

Write a class named TestScores. The class constructor should accept an array of test scores as its argument.

  Develop a web-based pothole tracking and repair system

Why is it that many software developers don't pay enough attention to requirements engineering? Are there ever circumstances where you can skip it?

  Determine and print out the number of quarters

Determine and print out the number of quarters, dimes, nickels, and pennies to add up to that number of cents. No, you can't use all pennies.

  Questionyou identified use cases and considered domain

questionyou identified use cases and considered domain classes for the state patrol ticket processing system. review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd