How does logical security differ from physical security?

DQ 1: How does logical security differ from physical security? Provide several examples?DQ 2: What are some physical security threats in your company? What suggestions would you make to correct these concerns?DQ 3: Based on the Woodward (2008) article, do you think advances in wireless technology have outrun advances in wireless security? What impact will WPA2 have on wireless security?