Discussion Use the information found atProtecting Your System: Physical Securityto research how determining possible physical threats may affect the