Complete a Physical Security Assessment (internal and external) of your place of work or living area. If you use your work area make sure you inform the Security Manager to get permission as to what y
Assignment 2: Physical Security Assessment
Assignment 2: Physical Security Assessment
Your Name
School of Computer and Information Sciences, University of the Cumberlands
ISOL634 Physical Security
Dr. Ronald P. Sperano
Current Date
Table of ContentsBasic Threats (Note: This H1 required) 3
Theft (Note: This H2 required) 3
Violence (Note: This H2 required) 3
Natural Disaster (Note: This H2 required) 3
Heading 3
Layers of Protection (Note: This H1 required) 3
Access Controls (Note: This H2 required) 3
Security Force (Note: This H2 required) 3
Alarm Systems (Note: This H2 required) 3
Lighting (Note: This H2 required) 4
Communications (Note: This H2 required) 4
Levels of Security (Note: This H1 required) 4
Minimum (Note: This H2 required) 4
Low-level (Note: This H2 required) 4
Medium (Note: This H2 required) 4
High-level (Note: This H2 required) 4
Maximum (Note: This H2 required) 4
Conclusion (Note: This H1 required) 4
Most Likely Threat (Note: This H2 required) 4
Neutralization of Threat (Note: This H2 required) 4
Heading 5
References (Note: This H1 required) 6
Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting)
Basic Threats (Note: This H1 required)Start typing here.
Theft (Note: This H2 required)Start typing here.
Violence (Note: This H2 required)Start typing here
Natural Disaster (Note: This H2 required)Start typing here
HeadingStart typing here
Layers of Protection (Note: This H1 required)Start typing here.
Access Controls (Note: This H2 required)Start typing here.
Security Force (Note: This H2 required)Start typing here
Alarm Systems (Note: This H2 required)Start typing here
Lighting (Note: This H2 required)Start typing here
Communications (Note: This H2 required)Start typing here
Levels of Security (Note: This H1 required)Start typing here.
Minimum (Note: This H2 required)Start typing here.
Low-level (Note: This H2 required)Start typing here
Medium (Note: This H2 required)Start typing here
High-level (Note: This H2 required)Start typing here
Maximum (Note: This H2 required)Start typing here
Conclusion (Note: This H1 required)Start typing here.
Most Likely Threat (Note: This H2 required)Start typing here.
Neutralization of Threat (Note: This H2 required)Start typing here
HeadingStart typing here
References (Note: This H1 required)There are no sources in the current document.