: Physical perimeters such as fences and barriers.
: Safeguarding the transmission of information.
: Barriers and detection systems to manage physical access.
For a detailed breakdown of specific security roles and threats like pilfering, watch this lecture excerpt: