The below needs to be completed in APA format with at least two citiations.
The security of information asset is critical to any operational environment. The existence of (or the lack of) good security measures will determine the stability of the operating environment and the availability of resources. As a result of this fact, security should not be an afterthought in the network architectural design process. In any network environment, the most successful access control solution is one that was considered in the design process. Access control can be broken down into area, physical access control, and logical access control.
In 4–6 paragraphs, address the following: