What is involved in a description of the set of tangible controls to address physical security for a network security policy?

What will be an ideal response?


A crucial element of a network security policy is the description of a set of tangible controls to address physical security. Elements of physical location, physical access, and environment are crucial aspects of securing a network. For instance, sample elements of a network security control policy include such specifications as, "all network equipment closets and cable runs should be built according to appropriate codes and standards," or "all network equipment should be kept under lock and key," or even "only authorized personnel will be granted physical access to network equipment."

Computer Science & Information Technology

You might also like to view...

The Mac OS X operating system is distributed under the terms of a GPL.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following functions would NOT be used to construct an amortization table?

A) CUMPRINC B) PV C) IPMT D) PPMT

Computer Science & Information Technology

The use of computer forensics is sometimes used as incriminating evidence in criminal cases and is often referred to as exculpatory evidence

Indicate whether the statement is true or false.

Computer Science & Information Technology

The Highlight Changes command is located on the ____ menu.

A. Protect Changes B. Show/Hide Changes C. Make Changes D. Track Changes

Computer Science & Information Technology