100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SEP2606 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 2 October 2025

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
26-09-2025
Escrito en
2025/2026

SEP2606 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 2 October 2025; 100% TRUSTED Complete, trusted solutions and explanations. For assistance, Whats-App 0.6.7-1.7.1-1.7.3.9. Ensure your success with us.. Compulsory assessment: Assessment 02 SEP Due date: Thursday, 02 October 2025, 23:00 SECTION A - WRITTEN ASSIGNMENT As a student at a tertiary institution, we expect you to do independent research (collecting information on your subject) and then produce your own answers of a high standard. This means that you must do extra reading besides just reading your study guide. For this assignment you must consult various sources of information and paraphrase (using your own words), analyse, interpret and reference all the information that you collected during the research. Please make sure that you read the guidelines in the Tutorial letter 301 on how to approach Assignment 02 carefully before you start assessment 2. Also be sure to use the referencing Tutorial letter 301 (SCHJALL/301/4/2025) for correct referencing methods. bQUESTION 1 Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2) Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2) Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2)

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
26 de septiembre de 2025
Número de páginas
10
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SEP2606
Assignment 2 Semester 2 2025
Unique number:
Due Date: 2 October 2025

QUESTION 1

After risks are identified and vulnerabilities assessed, management must decide how to
respond in order to safeguard organisational assets. According to Rogers, Van Schalkwyk,
and Ngoveni (2017), there are four cost-effective decisions available to management,
commonly referred to as the “four Ts” of risk management: terminate, tolerate, transfer, and
treat.

The first option, terminate, involves stopping the risky activity altogether. This is chosen
when the potential consequences are too severe to justify continuation. For example, if
delivery trucks are repeatedly hijacked in a high-crime zone, a company may decide to
terminate deliveries to that area and instead require customers to collect goods at a safer
location (Rogers et al., 2017).

The second option, tolerate, is selected when the risk is minor and not worth the cost of
implementing controls. For instance, the occasional loss of office stationery may be tolerated
as the cost of control would outweigh the benefit. However, tolerance must be balanced, as
Terms of use
small losses can escalate if not monitored (Rogers et al., 2017).
By making use of this document you agree to:
 Use this document as a guide for learning, comparison and reference purpose,
Terms of use
 Not to duplicate, reproduce and/or misrepresent the contents of this document as your own work,
By making use of this document you agree to:
 Use this document
Fully accept the consequences
solely as a guide forshould you plagiarise
learning, reference,or and
misuse this document.
comparison purposes,
 Ensure originality of your own work, and fully accept the consequences should you plagiarise or misuse this document.
 Comply with all relevant standards, guidelines, regulations, and legislation governing academic and written work.

Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is" without any express or
implied representations or warranties. The author accepts no responsibility or liability for any actions taken based on the
information contained within this document. This document is intended solely for comparison, research, and reference purposes.
Reproduction, resale, or transmission of any part of this document, in any form or by any means, is strictly prohibited.

, +27 67 171 1739



QUESTION 1

After risks are identified and vulnerabilities assessed, management must decide how
to respond in order to safeguard organisational assets. According to Rogers, Van
Schalkwyk, and Ngoveni (2017), there are four cost-effective decisions available to
management, commonly referred to as the “four Ts” of risk management: terminate,
tolerate, transfer, and treat.

The first option, terminate, involves stopping the risky activity altogether. This is
chosen when the potential consequences are too severe to justify continuation. For
example, if delivery trucks are repeatedly hijacked in a high-crime zone, a company
may decide to terminate deliveries to that area and instead require customers to
collect goods at a safer location (Rogers et al., 2017).

The second option, tolerate, is selected when the risk is minor and not worth the
cost of implementing controls. For instance, the occasional loss of office stationery
may be tolerated as the cost of control would outweigh the benefit. However,
tolerance must be balanced, as small losses can escalate if not monitored (Rogers
et al., 2017).

The third option, transfer, occurs when responsibility for the risk is shifted to a third
party. This is commonly done through insurance or outsourcing. For example,
contracting a cash-in-transit company to transport money reduces the organisation’s
direct exposure (Rogers et al., 2017).

Finally, treat involves implementing control measures to minimise risk. Examples
include installing CCTV, access control systems, and alarm-linked tagging devices in
retail environments. This option is often the most practical and ensures that threats
are managed at their root cause (Rogers et al., 2017).




QUESTION 2




Security Measures Costs

Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is"
without any express or implied representations or warranties. The author accepts no responsibility or
liability for any actions taken based on the information contained within this document. This document is
intended solely for comparison, research, and reference purposes. Reproduction, resale, or transmission
of any part of this document, in any form or by any means, is strictly prohibited.
$3.07
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EduPal University of South Africa (Unisa)
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
149181
Miembro desde
7 año
Número de seguidores
35996
Documentos
4338
Última venta
2 horas hace

4.2

13562 reseñas

5
7808
4
2689
3
1791
2
455
1
819

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes