Chat with us, powered by LiveChat Assignment 3: Layers of Protection Analysis - Writeden

Topic: Perform a LOPA (Layers of Protection Analysis) of your local living area or work location. Remember to get permission from security.Instructions: Please download the Assignment 7 Layers of Protection Analysis (LOPA) template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_7_LOPA_Assessment.docx and submit to this dropbox.

Assignment 3: Layers of Protection Analysis (LOPA) 1

Assignment 3: Layers of Protection Analysis (LOPA)

Your Name

School of Computer and Information Sciences, University of the Cumberlands

ISOL634 Physical Security

Dr. Name of your Instructor

Current Date

Table of Contents What Could Happen? (Note: This H1 required) 4 Threat 1 from Outside (Note: H2 required with actual threat) 4 Threat 2 from Outside (Note: H2 required with actual threat) 4 Threat 3 from Outside (Note: H2 required with actual threat) 4 Threat n from Outside (optional) 4 Threat 1 from Inside (Note: H2 required with actual threat) 4 Threat 2 from Inside (Note: H2 required with actual threat) 4 Threat 3 from Inside (Note: H2 required with actual threat) 4 Threat n from Inside (optional) 4 Frequency of Potential Threats (Note: This H1 required) 5 Frequency of Threat 1 from Outside (Note: H2 required with actual threat) 5 Frequency of Threat 2 from Outside (Note: H2 required with actual threat) 5 Frequency of Threat 3 from Outside (Note: H2 required with actual threat) 5 Frequency of Threat n from Outside (optional) 5 Frequency of Threat 1 from Inside (Note: H2 required with actual threat) 5 Frequency of Threat 2 from Inside (Note: H2 required with actual threat) 5 Frequency of Threat 3 from Inside (Note: H2 required with actual threat) 5 Frequency of Threat n from Inside (optional) 5 How Effective are the Layers of Protection (Note: This H1 required) 6 Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer) 6 Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer) 6 Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer) 6 Effectiveness of Layer n against Threats from Outside (Note: optional) 6 Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer) 6 Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer) 6 Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer) 6 Effectiveness of Layer n against Threats from Inside (Note: optional) 6 How Tolerable are the Mitigation Layers (Note: This H1 required) 7 Outside Layers of Protection Tolerability (Note: H2 required with actual layer) 7 Inside Layers of Protection Tolerability (Note: H2 required with actual layer) 7 References 8

Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting).

What Could Happen? (Note: This H1 required)

Start typing here.

Threat 1 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat 2 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat 3 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat n from Outside (optional)

Start typing here.

Threat 1 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat 2 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat 3 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat n from Inside (optional)

Start typing here.

Frequency of Potential Threats (Note: This H1 required)

Start typing here.

Frequency of Threat 1 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 2 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 3 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat n from Outside (optional)

Start typing here.

Frequency of Threat 1 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 2 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 3 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat n from Inside (optional)

Start typing here.

How Effective are the Layers of Protection (Note: This H1 required)

Start typing here.

Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer n against Threats from Outside (Note: optional)

Start typing here.

Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer n against Threats from Inside (Note: optional)

Start typing here.

How Tolerable are the Mitigation Layers (Note: This H1 required)

Start typing here.

Outside Layers of Protection Tolerability (Note: H2 required with actual layer)

Start typing here. (Note: each layer should be addressed)

Inside Layers of Protection Tolerability (Note: H2 required with actual layer)

Start typing here. (Note: each layer should be addressed)

References There are no sources in the current document.