Identify three steps required for implementing a physical and environmental security program. Select one step that would be the most challenging to perform and one step that you believe is the most important for providing protection against information assets of an organization. Explain why you chose each step. Suggest three security support competencies of a privacy professional that support the security strategy of an organization. Justify your suggestions.