Countermeasures for protection of information assets
Security procedures
Physical Barriers
Intrusion detection
System monitors
Identification and authentication tools
Environmental controls
Threat types
Threat sources
Vulnerabilities
Physical security procedures
Environmental controls