Identify risks and vulnerabilities related to physical security within a network.
Examples: personnel access and risks, hardware access, data access and availability