100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SEP2602 Assignment 2 ( ANSWERS) Semester 2 2024 - DUE 20 September 2024

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
19-09-2024
Written in
2024/2025

QUESTION 1 1. Physical Security: This includes measures to protect assets from physical threats such as theft, vandalism, or unauthorized access. Common tools include surveillance cameras, alarms, locks, and barriers. 2. Personnel Security: Ensuring the trustworthiness and reliability of individuals with access to critical information or assets. This may involve background checks, training, and enforcing access controls. 3. Policy: Clear security policies set the rules and guidelines for protecting assets, data, and personnel. These policies outline acceptable behavior, access levels, and the consequences of violations. 4. Procedures: These are step-by-step instructions on how to respond to security threats or incidents, ensuring quick, organized, and efficient reactions to emergencies or breaches. Together, these components ensure a well-rounded approach to addressing security risks.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Course

Document information

Uploaded on
September 19, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEP2602 Assignment 2 (ANSWERS) Semester 2
2024 - DUE 20 September 2024

, SEP2602 ASSIGNMENT 2 (ANSWERS) SEMESTER 2 2024 - DUE 20 SEPTEMBER 2024

Course

Industrial Security in Practice (SEP2602)

Institution

University Of South Africa (Unisa)

Book

Industrial Security Management




QUESTION 1



Asset Protection: This encompasses strategies aimed at defending physical assets from

threats such as theft, vandalism, or unauthorized access. Commonly used safeguards include

surveillance cameras, alarm systems, secure locks, and physical barriers.



Employee Security Management: This ensures that individuals with access to sensitive

information or resources are reliable and trustworthy. Key measures include conducting

background checks, providing security training, and applying strict access control procedures.



Security Policy Framework: Clearly defined security policies outline the rules and

procedures for protecting assets, data, and personnel. These policies establish acceptable

practices, determine access privileges, and outline consequences for violations.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PacesetterUNISA Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
172
Member since
1 year
Number of followers
37
Documents
466
Last sold
1 month ago

3.7

23 reviews

5
11
4
2
3
5
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions