While logical access to systems, in this internet age, is a very important subject, the control of physical access to the assets of the organization is also critical important. Some of the technologies used to control physical access are also used to control logical access, in this discussion topic, identify and discuss the Approaches to Physical Security. Remember to provide at least two references to support your position.