3.3 3 Implement Physical Security Countermeasures