ASSIGNMENT 2 SEMESTER 1 2025
UNIQUE NO.
DUE DATE: 29 APRIL 2025
, SEP3701
Assignment 2 Semester 1 2025
Unique Number:
Due Date: 29 April 2025
Applied Security Risk Management
Question 1
Draft the Unisa Security Risk Management Model and give reasons for the
addition of steps 9 and 10 respectively.
The Unisa Security Risk Management Model follows these steps:
1. Identify assets – First, you figure out what you are trying to protect. This could
be people, buildings, money, information, or equipment.
2. Identify threats – Next, you look at what could harm your assets. Threats could
be theft, vandalism, fires, or even cyber-attacks.
3. Identify vulnerabilities – Then, you find out where the weaknesses are. Maybe
there are no security guards, broken cameras, or unlocked doors.
4. Assess risks – Here, you look at how likely the threats are and how badly they
could hurt you.
5. Select a risk strategy – After understanding the risks, you decide what to do:
accept it, reduce it, transfer it (like getting insurance), or avoid it.
6. Design risk control measures – Now you plan actions to manage the risk, like
installing alarms, hiring guards, or setting up new rules.
7. Implement measures – You put your plans into action. Equipment is installed,
people are trained, and rules are enforced.
8. Evaluate and maintain measures – You check if your security measures are
working. If they aren’t, you fix them.