What is involved in a description of the set of tangible controls to address physical security for a network security policy?
What will be an ideal response?
A crucial element of a network security policy is the description of a set of tangible controls to address physical security. Elements of physical location, physical access, and environment are crucial aspects of securing a network. For instance, sample elements of a network security control policy include such specifications as, "all network equipment closets and cable runs should be built according to appropriate codes and standards," or "all network equipment should be kept under lock and key," or even "only authorized personnel will be granted physical access to network equipment."
You might also like to view...
The Mac OS X operating system is distributed under the terms of a GPL.
Answer the following statement true (T) or false (F)
Which of the following functions would NOT be used to construct an amortization table?
A) CUMPRINC B) PV C) IPMT D) PPMT
The use of computer forensics is sometimes used as incriminating evidence in criminal cases and is often referred to as exculpatory evidence
Indicate whether the statement is true or false.
The Highlight Changes command is located on the ____ menu.
A. Protect Changes B. Show/Hide Changes C. Make Changes D. Track Changes