Keeping in mind that organization must strictly regulate access to its network resources,
Keeping in mind that organization must strictly regulate access to its network
resources, as a member of an Information Security team trying to design a policy for a server room security for this server located in a computer or closet in the company, what possible threats could adversely affect this servers other network resources in this server room? what damages could possibly arise as a result of this traits when trying to design this policy for the server room security?