Assignment


 

                                                              

 

Assignment 3: Layers of Protection Analysis (LOPA)

 

Your Name

School of Computer and Information Sciences, University of the Cumberlands

ISOL634 Physical Security

Dr. Name of your Instructor

Current Date

 

 

 

Table of Contents

What Could Happen? (Note: This H1 required) 4

Threat 1 from Outside (Note: H2 required with actual threat) 4

Threat 2 from Outside (Note: H2 required with actual threat) 4

Threat 3 from Outside (Note: H2 required with actual threat) 4

Threat n from Outside (optional) 4

Threat 1 from Inside (Note: H2 required with actual threat) 4

Threat 2 from Inside (Note: H2 required with actual threat) 4

Threat 3 from Inside (Note: H2 required with actual threat) 4

Threat n from Inside (optional) 4

Frequency of Potential Threats (Note: This H1 required) 5

Frequency of Threat 1 from Outside (Note: H2 required with actual threat) 5

Frequency of Threat 2 from Outside (Note: H2 required with actual threat) 5

Frequency of Threat 3 from Outside (Note: H2 required with actual threat) 5

Frequency of Threat  n from Outside (optional) 5

Frequency of Threat 1 from Inside (Note: H2 required with actual threat) 5

Frequency of Threat 2 from Inside (Note: H2 required with actual threat) 5

Frequency of Threat 3 from Inside (Note: H2 required with actual threat) 5

Frequency of Threat n from Inside (optional) 5

How Effective are the Layers of Protection (Note: This H1 required) 6

Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer) 6

Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer) 6

Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer) 6

Effectiveness of Layer n against Threats from Outside (Note: optional) 6

Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer) 6

Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer) 6

Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer) 6

Effectiveness of Layer n against Threats from Inside (Note: optional) 6

How Tolerable are the Mitigation Layers (Note: This H1 required) 7

Outside Layers of Protection Tolerability (Note: H2 required with actual layer) 7

Inside Layers of Protection Tolerability (Note: H2 required with actual layer) 7

References. 8

 

 

Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting).

What Could Happen? (Note: This H1 required)

Start typing here.

Threat 1 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat 2 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat 3 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat n from Outside (optional)

Start typing here.

Threat 1 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat 2 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat 3 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat n from Inside (optional)

Start typing here.

Frequency of Potential Threats (Note: This H1 required)

Start typing here.

Frequency of Threat 1 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 2 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 3 from Outside (Note: H2 required with actual threat)

Start typing here.

 Frequency of Threat  n from Outside (optional)

Start typing here.

Frequency of Threat 1 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 2 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 3 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat n from Inside (optional)

Start typing here.

 

 

 

How Effective are the Layers of Protection (Note: This H1 required)

Start typing here.

Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer n against Threats from Outside (Note: optional)

Start typing here.

Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer n against Threats from Inside (Note: optional)

Start typing here.

 

 

 

How Tolerable are the Mitigation Layers (Note: This H1 required)

Start typing here.

Outside Layers of Protection Tolerability (Note: H2 required with actual layer)

Start typing here. (Note: each layer should be addressed)

Inside Layers of Protection Tolerability (Note: H2 required with actual layer)

Start typing here. (Note: each layer should be addressed)

 

 

 

References

There are no sources in the current document.