What is physical security? What are the primary threats to physical security? How are they manifested in attacks against the organization?
What are certification and accreditation when applied to information systems security management? List and describe at least two certification or accreditation processes.
If the C.I.A. triangle is incomplete, why is it so commonly used in security?
What value does an automated asset inventory system have for the risk identification process?