LATE SUBMISSION WILL NOT BE ACCEPTED BY PROF. Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings. When or where would you think it would be necessary to implement security measures for both? Discussion – 250 words Please read the following this week: Chapters 5, 9, and 10 in the course textbook Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. , 65-88. Doi: 10.13052/jcsm2245-1439.414 NIST. (2019). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). United States Department of Commerce. ISBN: 9781119475958Authors: Mike Chapple, James Michael Stewart, Darril Gibson Publisher: John Wiley & SonsPublication Date: 2018-04-10