I don’t know how to handle this Computer Science question and need guidance.
Internal controls. Without physical control the data stored on them is vulnerable as malicious people can do whatever they want from destroying it, altercation, disclose it. Physical controls are your first line of defense.
You work as an independent consultant within physical security, you are hired to choose a location for an IT start company that just received a multi-million dollar government contract to provide cloud services. Although the company will handle non-sensitive information you will provide consultations as the information was sensitive.
Task and Tips:
- You are to research a real location, a building that is for sale
- Cost of the building?
- Will you use security guards?
- What area will they monitor?
- What perimeter controls will be used
- What internal controls will be implemented
- Google Earth to see the physical layout,
- Zillow 3D is helpful.
- FEMA Perimeter Security Design