LESSON 2
EVALUATE PHYSICAL SECURITY REQUIREMENTS
FOR DATA PROCESSING FACILITIES AND LOGISTICAL SUPPORT ACTIVITIES
Critical Tasks:
191-386-0017
191-386-0022
OVERVIEW
LESSON DESCRIPTION:
In this lesson you will learn to evaluate and identify the physical security requirements for data
processing facilities and logistical support activities.
TERMINAL LEARNING OBJECTIVE:
ACTION:
Evaluate and provide recommendations for a physical security program.
CONDITION:
You will have this subcourse, pencil, and paper.
STANDARD:
You must take the final subcourse examination and earn a score of 70 percent.
REFERENCES:
The material contained in this lesson was derived from the following publications: FM
19-30, AR 380-19, AR 190-13, and Physical Security Update 10-3.
INTRODUCTION
Many people associate periods in the past with major social, economical, political or technological
development. Likewise, the 80's became famous for computer technology. Computers are used to
store data; they are used in the development of advanced weapons systems. The DOD daily expands
its dependency on microprocessing to accomplish its mission. Because of this, security for buildings
that house data processing facilities is a growing concern. Not only is the data store a potential target
for security threats, but corporate espionage is also a problem. This is the theft of computer
technology, which has become a major international crime. You are a physical security manager or
inspector. As such, you play a very large role in this complex dimension through security of Automated
Information Systems (AIS) facilities.
PART A - AUTOMATED INFORMATION SYSTEMS FACILITIES
1. In planning for physical security, the security officer or inspector must know what must be protected.
Generally, equipment, information, and
2-1
MP1003