Introduction

What?

Additional hardware.

Why?

Identify vulnerabilities and weaknesses in physical security controls.

How?