Physical Security Assessment

Assignment 2: Physical Security Assessment

Assignment 2: Physical Security Assessment

Your Name

School of Computer and Information Sciences, University of the Cumberlands

ISOL634 Physical Security

Instructor Name

Current Date

Table of Contents Basic Threats (Note: This H1 required) 4 Theft (Note: This H2 required) 4 Violence (Note: This H2 required) 4 Natural Disaster (Note: This H2 required) 4 Heading 4 Layers of Protection (Note: This H1 required) 4 Access Controls (Note: This H2 required) 4 Security Force (Note: This H2 required) 4 Alarm Systems (Note: This H2 required) 4 Lighting (Note: This H2 required) 5 Communications (Note: This H2 required) 5 Levels of Security (Note: This H1 required) 5 Minimum (Note: This H2 required) 5 Low-level (Note: This H2 required) 5 Medium (Note: This H2 required) 5 High-level (Note: This H2 required) 5 Maximum (Note: This H2 required) 5 Conclusion (Note: This H1 required) 5 Most Likely Threat (Note: This H2 required) 5 Neutralization of Threat (Note: This H2 required) 5 Heading 6 References (Note: This H1 required) 7

Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting)

Basic Threats (Note: This H1 required)

Start typing here.

Theft (Note: This H2 required)

Start typing here.

Violence (Note: This H2 required)

Start typing here

Natural Disaster (Note: This H2 required)

Start typing here

Heading

Start typing here

Layers of Protection (Note: This H1 required)

Start typing here.

Access Controls (Note: This H2 required)

Start typing here.

Security Force (Note: This H2 required)

Start typing here

Alarm Systems (Note: This H2 required)

Start typing here

Lighting (Note: This H2 required)

Start typing here

Communications (Note: This H2 required)

Start typing here

Levels of Security (Note: This H1 required)

Start typing here.

Minimum (Note: This H2 required)

Start typing here.

Low-level (Note: This H2 required)

Start typing here

Medium (Note: This H2 required)

Start typing here

High-level (Note: This H2 required)

Start typing here

Maximum (Note: This H2 required)

Start typing here

Conclusion (Note: This H1 required)

Start typing here.

Most Likely Threat (Note: This H2 required)

Start typing here.

Neutralization of Threat (Note: This H2 required)

Start typing here

Heading

Start typing here

References (Note: This H1 required) There are no sources in the current document.