Describe how both perimeter security and internal access controls are available and are used in the protection of assets.
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.When it comes to the issue of protecting assets of an institution, company or any other organization, people have developed various ways of securing their most valuable possessions. The most prominent ways of protecting assets are perimeter security and internal access control.
Perimeter security has been used from ancient civilizations to medieval rulers and even to modern times. Fortified walls, castles and trenches that have protected feudal monarchs in Medieval Europe are one of the examples of perimeter security. (p. 66) Total protection of valuable assets, that is perimeter security, was also used in totalitarian societies throughout history in order to protect the society from “foreigners...