Physical Security Simulation Report - Compose a report on student experience in performing the Physical Security survey

Asked by nerdygirl
Dated: 26th Apr'15 12:05 PM
Bounty offered: $13.99

Physical Security Simulation Report

Compose a report on student experience in performing the Physical Security survey.

Students will write a 250--500 word report (double-spaced) on experiences in the Physical Security Simulation.

Note: The correct information for the physical security survey is provided at the end of the simulation. The people who were interviewed were aware ahead of time that the survey was to take place and were also aware of the problems of concern to management.

Students should focus on the problems of acquiring good information through a physical security survey. Did the people you interviewed mislead you (either intentionally or unintentionally)? How did you go about obtaining good or correct information?
The purpose of this project is to make students aware of some important issues that arise in a facility security survey.

Grading Rubric for this Assignment:

Quality of content: 100% of points; however, points will be deducted for poor grammar and punctuation.
Note: Point deductions beyond this rubric can be made for work that does not have the minimum word count and/or if the work is not original (meaning written exclusively by the student).

In this simulation, you will take on the role of an apprentice security consultant in your first big assignment. Your experienced mentor will be there alongside you to guide you with valuable hints as you explore the clients' business locations. You will have opportunities to interview employees and survey rooms and offices through a click able interface that provides informative feedback. Roughly 35 minutes of activity.

Physical Security Simulation Instructions (Click on the link to view the instructions) Note: This simulation has audio, so please make sure you are on a computer with sound capabilities.

Physical Security Simulation Report - Tutorial with references
Answered by nerdygirl
Expert Rating: 200 Ratings
Dated: 26th Apr'15 12:05 PM
863 words and 0 attachment(s).
Tutorial Rating: 1 Rating
Sold 2 times.
(preview of the tutorial; some sections have been intentionally blurred)
…the     from   host (IPSEC-VPN     d       protocol   charge of     in       protocols   encryption mechanisms     the       provides   tunneling when     (PPP)       public   The protocol     non-IP       through   tunnel for     data       particularly   at Layer     the       of   OSI Model     work       data   associated machines     such       and   relay (IPSEC-VPN     d       good   tunneling requires     of       available   the markets     protocols       VPN   keep the     and       through   and authentication     usually       tunneling   it will     best       the   network has     protocols       security   all the     of       With   and good