Discussion: Physical Security
1. Find an article in an IEEE or ACM journal (or any other Peer Review Journal) about compliance or benchmark practices. Read and summarize the article, and give us your reactions to the article.
2. Describe the IT Security Policy Framework in detail. Provide references of your work as well.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.