This document of SEC 410 Week 4 Discussion Question 3 includes:
How do security personnel monitor access points? What are the vulnerabilities that require security personnel to properly monitor access points?