Explain why controlling physical access to information and information systems is a critical aspect to information security

profilesb1989