100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SEP3701 Assignment 2 Semester 1 Memo | Due 29 April 2025

Puntuación
-
Vendido
-
Páginas
16
Grado
A+
Subido en
29-04-2025
Escrito en
2024/2025

SEP3701 Assignment 2 Semester 1 Memo | Due 29 April 2025

Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
29 de abril de 2025
Número de páginas
16
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Exam (elaborations)
SEP3701 Assignment 2 Semester 1 Memo |
Due 29 April 2025
Course
 Applied Security Risk Management (SEP3701)
 Institution
 University Of South Africa (Unisa)

SEP3701 Assignment 2 Semester 1 Memo | Due 29 April 2025. All questions
fully answered.

QUESTION 1 1. Draft the Unisa Security Risk Management Model and give
reasons for the addition of steps 9 and 10 respectively.

UNISA Security Risk Management Model

The UNISA Security Risk Management Model outlines the steps for managing and mitigating
security risks effectively. This model is designed to help the institution identify, assess, manage,
and reduce security risks in order to ensure the safety of students, staff, facilities, and
information systems.

Here is the general Security Risk Management Model for UNISA (or any similar institution),
broken down into key steps:



1. Risk Identification

 This step involves recognizing potential security threats and risks that could impact the
institution. It includes identifying physical, cyber, environmental, and operational risks
that may affect the safety, integrity, and operations of the university.

2. Risk Assessment

 Once risks are identified, they must be evaluated for their likelihood of occurrence and
potential impact. This assessment involves determining the severity of risks and
classifying them based on priority (low, medium, or high).

3. Risk Analysis

 This step involves analyzing the identified risks in greater detail. The goal is to
understand the root causes of the risks, the potential vulnerabilities in the system, and the
extent to which these risks can affect UNISA’s operations.

,4. Risk Evaluation

 After analyzing the risks, the next step is to evaluate the level of each risk in relation to
the university’s strategic objectives, policies, and operational priorities. This step allows
the institution to determine which risks require immediate attention and which can be
managed over time.

5. Risk Control and Mitigation

 This step involves developing strategies to control, reduce, or eliminate identified risks. It
includes implementing preventive measures (e.g., physical security measures like locks,
or cybersecurity measures like firewalls) and contingency plans for addressing risks
should they materialize.

6. Risk Response

 In this step, the institution responds to the identified and evaluated risks by taking
appropriate actions, whether through risk avoidance, reduction, transfer, or acceptance.
The university may decide to avoid a certain risk by altering its processes, reduce its
impact through mitigation strategies, transfer the risk (e.g., through insurance), or accept
the risk and prepare for its consequences.

7. Monitoring and Review

 Continuous monitoring is crucial to ensure that the security measures and strategies
remain effective. This step involves tracking the effectiveness of the implemented
controls and continuously evaluating the risk landscape.

8. Communication and Consultation

 Effective communication with all stakeholders, including students, staff, and external
partners, is essential for a comprehensive risk management approach. This ensures that
everyone is informed of the security policies and any changes in security procedures.



9. Incident Response and Reporting (Reason for addition)

 Why is this step important? The addition of this step allows for a structured approach to
responding to incidents when they occur. By having a dedicated incident response plan,
UNISA ensures that security breaches or emergencies are handled swiftly, minimizing
potential damage. The reporting component is crucial because it ensures that incidents are
documented and communicated to the appropriate authorities and stakeholders. It also
helps in learning from these incidents to improve future security protocols.

, Reason for addition: Security incidents are inevitable, so the institution needs a clear
process for managing them. Without such a step, there may be confusion and
inefficiencies in responding to emergencies. Additionally, having a documented incident
reporting system helps in continuous improvement of security policies and practices.

10. Continuous Improvement and Feedback Loop (Reason for addition)

 Why is this step important? The continuous improvement step ensures that the
university’s security policies and practices evolve based on past experiences, changing
circumstances, and emerging risks. After incidents or routine evaluations, the feedback
loop helps refine strategies, policies, and technologies used in security risk management.
It contributes to making security risk management a dynamic and adaptable process.

Reason for addition: Security is an ever-changing landscape, and risks evolve as new
threats emerge. Therefore, it is crucial to have a continuous improvement process in
place. This allows the institution to adapt and update security measures, keeping them
relevant and effective over time. A feedback loop ensures that the lessons learned from
past risks and incidents are integrated into future planning, improving the overall security
framework.



Summary:

 Steps 9 and 10 (Incident Response and Reporting, and Continuous Improvement and
Feedback Loop) are crucial additions to the UNISA Security Risk Management Model
because they ensure that the university is prepared for security incidents, can respond
effectively, and continuously improves its security systems based on past experiences and
emerging threats.
 These steps contribute to creating a robust and adaptable security framework that is
proactive, responsive, and continuously evolving to ensure the long-term safety and
security of the institution.



QUESTION 2 2. Discuss the sociological factors that causes crime (do not
copy examples from your study guide).

Sociological Factors That Cause Crime

Crime is a complex phenomenon influenced by a variety of sociological factors. Sociologists
have long studied the ways in which society, its structures, and the conditions individuals face
can lead to criminal behavior. Below are some key sociological factors that contribute to crime:
$2.79
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
tabithamwendwa73 Chamberlain College Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
379
Miembro desde
1 año
Número de seguidores
82
Documentos
1032
Última venta
1 mes hace
brilliant tutorials

brilliant tutorials Attention all students! Are you struggling with a particular subject or just need some extra support to help you succeed? Look no further than our expert tutorial services! Our experienced tutors provide personalized one-on-one sessions to help you overcome your academic challenges and reach your full potential. Whether you need help with any module, our tutors are here to help. With flexible scheduling and competitive pricing, there\'s no reason to struggle on your own. Invest in your academic success today and book a tutorial session with us

Lee mas Leer menos
3.6

64 reseñas

5
28
4
14
3
3
2
4
1
15

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes