Complete a Physical Security Assessment (internal and external) of your place of work or living area. If you use your work area make sure you inform the Security Manager to get permission as to what y

Assignment 2: Physical Security Assessment

Assignment 2: Physical Security Assessment

Your Name

School of Computer and Information Sciences, University of the Cumberlands

ISOL634 Physical Security

Dr. Ronald P. Sperano

Current Date

Table of Contents

Basic Threats (Note: This H1 required) 3

Theft (Note: This H2 required) 3

Violence (Note: This H2 required) 3

Natural Disaster (Note: This H2 required) 3

Heading 3

Layers of Protection (Note: This H1 required) 3

Access Controls (Note: This H2 required) 3

Security Force (Note: This H2 required) 3

Alarm Systems (Note: This H2 required) 3

Lighting (Note: This H2 required) 4

Communications (Note: This H2 required) 4

Levels of Security (Note: This H1 required) 4

Minimum (Note: This H2 required) 4

Low-level (Note: This H2 required) 4

Medium (Note: This H2 required) 4

High-level (Note: This H2 required) 4

Maximum (Note: This H2 required) 4

Conclusion (Note: This H1 required) 4

Most Likely Threat (Note: This H2 required) 4

Neutralization of Threat (Note: This H2 required) 4

Heading 5

References (Note: This H1 required) 6



Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting)

Basic Threats (Note: This H1 required)

Start typing here.

Theft (Note: This H2 required)

Start typing here.

Violence (Note: This H2 required)

Start typing here

Natural Disaster (Note: This H2 required)

Start typing here

Heading

Start typing here

Layers of Protection (Note: This H1 required)

Start typing here.

Access Controls (Note: This H2 required)

Start typing here.

Security Force (Note: This H2 required)

Start typing here

Alarm Systems (Note: This H2 required)

Start typing here

Lighting (Note: This H2 required)

Start typing here

Communications (Note: This H2 required)

Start typing here

Levels of Security (Note: This H1 required)

Start typing here.

Minimum (Note: This H2 required)

Start typing here.

Low-level (Note: This H2 required)

Start typing here

Medium (Note: This H2 required)

Start typing here

High-level (Note: This H2 required)

Start typing here

Maximum (Note: This H2 required)

Start typing here

Conclusion (Note: This H1 required)

Start typing here.

Most Likely Threat (Note: This H2 required)

Start typing here.

Neutralization of Threat (Note: This H2 required)

Start typing here

Heading

Start typing here

References (Note: This H1 required)

There are no sources in the current document.