From the textbook, “The objective of _______________________…

From the textbook, “The objective of _________________________ is to prevent unauthorized access, damage, and interference to business premises and equipment.  In this chapter, with a focus on the , we discussed the three elements to security—obstacles that deter trivial attackers and delay serious ones, detection systems that make it more likely that the attack will be noticed, and a response capability to repel or catch attackers.   We began at the security perimeter, worked our way gradually inward to the data center, and then back out to mobile devices. Starting at the perimeter, we saw the importance of having a layered defense model as well as incorporating CPTED concepts.”

__________________ codifies the Department of Homeland Secur…

__________________ codifies the Department of Homeland Security’s role in administering the implementation of information security policies for federal Executive Branch civilian agencies, overseeing agencies’ compliance with those policies, and assisting OMB in developing those policies.