AGENDA
- Countermeasures for protection of information assets
- Security procedures
- Physical Barriers
- Intrusion detection
- System monitors
- Identification and authentication tools
- Environmental controls
- Threat types
- Threat sources
- Vulnerabilities
- Physical security procedures
- Environmental controls