Texas Health and Human Services System logo
HHS Computer Usage and
Information Security Training
Module 6: Protecting Resources & Information
Outline - opens course outline in a new window
Help - opens Help menu in a new window
Close course - closes course
2. Protecting Resources Back
10 of 11
Next

Physical Security Perimeter

Physical security perimeters are used to:

  • Restrict access to only authorized users
  • Reduce exposures to malicious threats
  • Allow access privileges to be revoked quickly, if necessary
  • Safeguard the physical perimeter of agency facilities that house HHS Enterprise information resources
a computer monitor wrapped in chains.
Instructions Click or select the NEXT button above to continue.
Previous Lesson
  Next Lesson