Assignment 3: Layers of Protection Analysis (LOPA)

Your Name
School of Computer and Information Sciences, University of the Cumberlands
ISOL634 Physical Security
Dr. Name of your Instructor
Current Date

Table of Contents
What Could Happen? (Note: This H1 required) 4
Threat 1 from Outside (Note: H2 required with actual threat) 4
Threat 2 from Outside (Note: H2 required with actual threat) 4
Threat 3 from Outside (Note: H2 required with actual threat) 4
Threat n from Outside (optional) 4
Threat 1 from Inside (Note: H2 required with actual threat) 4
Threat 2 from Inside (Note: H2 required with actual threat) 4
Threat 3 from Inside (Note: H2 required with actual threat) 4
Threat n from Inside (optional) 4
Frequency of Potential Threats (Note: This H1 required) 5
Frequency of Threat 1 from Outside (Note: H2 required with actual threat) 5
Frequency of Threat 2 from Outside (Note: H2 required with actual threat) 5
Frequency of Threat 3 from Outside (Note: H2 required with actual threat) 5
Frequency of Threat n from Outside (optional) 5
Frequency of Threat 1 from Inside (Note: H2 required with actual threat) 5
Frequency of Threat 2 from Inside (Note: H2 required with actual threat) 5
Frequency of Threat 3 from Inside (Note: H2 required with actual threat) 5
Frequency of Threat n from Inside (optional) 5
How Effective are the Layers of Protection (Note: This H1 required) 6
Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer) 6
Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer) 6
Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer) 6
Effectiveness of Layer n against Threats from Outside (Note: optional) 6
Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer) 6
Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer) 6
Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer) 6
Effectiveness of Layer n against Threats from Inside (Note: optional) 6
How Tolerable are the Mitigation Layers (Note: This H1 required) 7
Outside Layers of Protection Tolerability (Note: H2 required with actual layer) 7
Inside Layers of Protection Tolerability (Note: H2 required with actual layer) 7
References 8

Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting).
What Could Happen? (Note: This H1 required)
Start typing here.
Threat 1 from Outside (Note: H2 required with actual threat)
Start typing here.
Threat 2 from Outside (Note: H2 required with actual threat)
Start typing here.
Threat 3 from Outside (Note: H2 required with actual threat)
Start typing here.
Threat n from Outside (optional)
Start typing here.
Threat 1 from Inside (Note: H2 required with actual threat)
Start typing here.
Threat 2 from Inside (Note: H2 required with actual threat)
Start typing here.
Threat 3 from Inside (Note: H2 required with actual threat)
Start typing here.
Threat n from Inside (optional)
Start typing here.
Frequency of Potential Threats (Note: This H1 required)
Start typing here.
Frequency of Threat 1 from Outside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 2 from Outside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 3 from Outside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat n from Outside (optional)
Start typing here.
Frequency of Threat 1 from Inside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 2 from Inside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat 3 from Inside (Note: H2 required with actual threat)
Start typing here.
Frequency of Threat n from Inside (optional)
Start typing here.

How Effective are the Layers of Protection (Note: This H1 required)
Start typing here.
Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer n against Threats from Outside (Note: optional)
Start typing here.
Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer)
Start typing here.
Effectiveness of Layer n against Threats from Inside (Note: optional)
Start typing here.

How Tolerable are the Mitigation Layers (Note: This H1 required)
Start typing here.
Outside Layers of Protection Tolerability (Note: H2 required with actual layer)
Start typing here. (Note: each layer should be addressed)
Inside Layers of Protection Tolerability (Note: H2 required with actual layer)
Start typing here. (Note: each layer should be addressed)

References
There are no sources in the current document.

Published by
Essays
View all posts