This document discusses threats to communication networks, network security best practices, and non-technical security practices. It asks about predominant electronic and physical threats, the importance of security policies and procedures, and how an organization measures up to non-technical best practices as they relate to physical security.