UC Importance Of IT Security In Strategy Planning Discussion
Description
DISCUSSION 5: PHYSICAL SECURITY
Discuss an organizationàneed for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.
Please make your initial post and two response posts substantive (attached). A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source
- Make an argument concerning the topic.
References: Read the following learning materials.
Yaokumah, W., & Brown, S. (2014). An empirical examination of the relationship between information security/business strategic alignment and information security governance domain areas. Journal of Law and Governance, 9(2).
R. Sari, R. Kosala, B. Ranti and S. H. Supangkat, “COSO Framework for Warehouse Management Internal Control Evaluation: Enabling Smart Warehouse Systems,”2018 International Conference on ICT for Smart Society (ICISS), 2018, pp. 1-5.
Eric Buhrendorf. (2019). Outsourcing IT is a money-saving cyber safety net for company data. Fairfield County Business Journal, 55(20), 12r.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."