Assignment 3 Layers of Protection _LOPA_ AnalysisTemplate.docx Assignment 3 Layers of Protection _LOPA_ AnalysisTemplate.docx – Alternative Formats (28.424 KB)
Topic: Perform a LOPA (Layers of Protection Analysis) of your local living area or work location. Remember to get permission from security.Instructions: Please download the Assignment 7 Layers of Protection Analysis (LOPA) template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_7_LOPA_Assessment.docx and submit to this dropbox.
Assignment3LayersofProtection_LOPA_AnalysisTemplate.docx
Assignment 3: Layers of Protection Analysis (LOPA) 1
Assignment 3: Layers of Protection Analysis (LOPA)
Your Name
School of Computer and Information Sciences, University of the Cumberlands
ISOL634 Physical Security
Dr. Name of your Instructor
Current Date
Table of Contents What Could Happen? (Note: This H1 required) 4 Threat 1 from Outside (Note: H2 required with actual threat) 4 Threat 2 from Outside (Note: H2 required with actual threat) 4 Threat 3 from Outside (Note: H2 required with actual threat) 4 Threat n from Outside (optional) 4 Threat 1 from Inside (Note: H2 required with actual threat) 4 Threat 2 from Inside (Note: H2 required with actual threat) 4 Threat 3 from Inside (Note: H2 required with actual threat) 4 Threat n from Inside (optional) 4 Frequency of Potential Threats (Note: This H1 required) 5 Frequency of Threat 1 from Outside (Note: H2 required with actual threat) 5 Frequency of Threat 2 from Outside (Note: H2 required with actual threat) 5 Frequency of Threat 3 from Outside (Note: H2 required with actual threat) 5 Frequency of Threat n from Outside (optional) 5 Frequency of Threat 1 from Inside (Note: H2 required with actual threat) 5 Frequency of Threat 2 from Inside (Note: H2 required with actual threat) 5 Frequency of Threat 3 from Inside (Note: H2 required with actual threat) 5 Frequency of Threat n from Inside (optional) 5 How Effective are the Layers of Protection (Note: This H1 required) 6 Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer) 6 Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer) 6 Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer) 6 Effectiveness of Layer n against Threats from Outside (Note: optional) 6 Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer) 6 Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer) 6 Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer) 6 Effectiveness of Layer n against Threats from Inside (Note: optional) 6 How Tolerable are the Mitigation Layers (Note: This H1 required) 7 Outside Layers of Protection Tolerability (Note: H2 required with actual layer) 7 Inside Layers of Protection Tolerability (Note: H2 required with actual layer) 7 References 8
Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting).
What Could Happen? (Note: This H1 required)
Start typing here.
Threat 1 from Outside (Note: H2 required with actual threat)
Start typing here.
Threat 2 from Outside (Note: H2 required with actual threat)
Start typing here.
Threat 3 from Outside (Note: H2 required with actual threat)
Start typing here.
Threat n from Outside (optional)
Start typing here.
Threat 1 from Inside (Note: H2 required with actual threat)
Start typing here.
Threat 2 from Inside (Note: H2 required with actual threat)
Start typing here.
Threat 3 from Inside (Note: H2 required with actual threat)
Start typing here.
Threat n from Inside (optional)
Start typing here.
Frequency of Potential Threats (Note: This H1 required)
Start typing here.
Frequency of Threat 1 from Outside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 2 from Outside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 3 from Outside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat n from Outside (optional)
Start typing here.
Frequency of Threat 1 from Inside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 2 from Inside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 3 from Inside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat n from Inside (optional)
Start typing here.
How Effective are the Layers of Protection (Note: This H1 required)
Start typing here.
Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer n against Threats from Outside (Note: optional)
Start typing here.
Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer n against Threats from Inside (Note: optional)
Start typing here.
How Tolerable are the Mitigation Layers (Note: This H1 required)
Start typing here.
Outside Layers of Protection Tolerability (Note: H2 required with actual layer)
Start typing here. (Note: each layer should be addressed)
Inside Layers of Protection Tolerability (Note: H2 required with actual layer)
Start typing here. (Note: each layer should be addressed)
References There are no sources in the current document.
Interested in getting help with this assignment?
Get a professional writing team to work on your assignment!
Order Now
Recent postsFor this final assignment, you will prepare a brief paper detailing the steps undertaken to complete a presentation that disseminates information you assemble
Please choose to answer only one of the 2 following questions. Option 1: In your opinion and based on scientific, peer-reviewed published evidence, does child
At the beginning of the previous academic year, the institution announced it would drop football at the conclusion of the season. The announcement created pub
you will review current research in Personality and provide a critical evaluation of that personality research through an annotated bibliography. An annotated
In Module 5, we considered the third in our three-part series on research design. Specifically, the focus was on the longitudinal studies, in which the resear
Need help with a similar or different Task?
We have the best writers to help you. Hire Writer Now