HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
2. Protecting Resources
10 of 11
Physical Security Perimeter
Physical security perimeters are used to:
Restrict access to only authorized users
Reduce exposures to malicious threats
Allow access privileges to be revoked quickly, if necessary
Safeguard the physical perimeter of agency facilities that house HHS Enterprise information resources
Click or select the
NEXT
button above to continue.