,SEP3701 Assignment 2 (COMPLETE GUIDELINE)
Semester 1 2025 - DUE 29 April 2025; 100% TRUSTED
Complete, trusted solutions and explanations.
QUESTION 1
Draft the Unisa Security Risk Management Model and give
reasons for the addition of steps 9 and 10 respectively. (10)
ANSWER
UNISA Security Risk Management Model
The University of South Africa (UNISA) Security Risk
Management Model aims to identify, assess, manage, and
mitigate risks associated with security within the university
environment. The model is designed to enhance the safety of
staff, students, and the university's physical and digital
infrastructure.
Steps in the UNISA Security Risk Management Model:
1. Identify Security Risks:
o This is the first and foremost step where all potential
security threats and vulnerabilities that may affect the
university community are identified. This includes
physical threats (e.g., intrusions, vandalism) and cyber
threats (e.g., data breaches, hacking).
2. Risk Assessment:
o After identifying risks, the next step is to assess the
likelihood and potential impact of each identified risk.
, This helps prioritize which risks need to be addressed
urgently.
3. Risk Evaluation:
o In this step, the risks are categorized (e.g., low,
medium, high) based on their potential impact and
likelihood. The evaluation helps in allocating
resources to manage high-priority risks.
4. Design and Implement Security Strategies:
o The university develops strategies to mitigate or
eliminate the risks. This includes implementing
security technologies, protocols, and policies (e.g.,
surveillance systems, access control).
5. Create a Security Policy Framework:
o A formalized security policy is created that outlines
the responsibilities, procedures, and protocols for
managing security risks at UNISA. This policy acts as
a guide for all stakeholders.
6. Training and Awareness Programs:
o Training programs for staff, students, and faculty are
critical to ensure everyone understands the security
protocols and knows how to respond to different
threats.
7. Resource Allocation:
o Adequate resources, including financial,
technological, and human resources, are allocated to
ensure the successful implementation of security
measures.
8. Monitor and Review:
o Continuous monitoring of security activities ensures
that the security measures are effective. Regular
reviews help identify gaps or areas for improvement.
Semester 1 2025 - DUE 29 April 2025; 100% TRUSTED
Complete, trusted solutions and explanations.
QUESTION 1
Draft the Unisa Security Risk Management Model and give
reasons for the addition of steps 9 and 10 respectively. (10)
ANSWER
UNISA Security Risk Management Model
The University of South Africa (UNISA) Security Risk
Management Model aims to identify, assess, manage, and
mitigate risks associated with security within the university
environment. The model is designed to enhance the safety of
staff, students, and the university's physical and digital
infrastructure.
Steps in the UNISA Security Risk Management Model:
1. Identify Security Risks:
o This is the first and foremost step where all potential
security threats and vulnerabilities that may affect the
university community are identified. This includes
physical threats (e.g., intrusions, vandalism) and cyber
threats (e.g., data breaches, hacking).
2. Risk Assessment:
o After identifying risks, the next step is to assess the
likelihood and potential impact of each identified risk.
, This helps prioritize which risks need to be addressed
urgently.
3. Risk Evaluation:
o In this step, the risks are categorized (e.g., low,
medium, high) based on their potential impact and
likelihood. The evaluation helps in allocating
resources to manage high-priority risks.
4. Design and Implement Security Strategies:
o The university develops strategies to mitigate or
eliminate the risks. This includes implementing
security technologies, protocols, and policies (e.g.,
surveillance systems, access control).
5. Create a Security Policy Framework:
o A formalized security policy is created that outlines
the responsibilities, procedures, and protocols for
managing security risks at UNISA. This policy acts as
a guide for all stakeholders.
6. Training and Awareness Programs:
o Training programs for staff, students, and faculty are
critical to ensure everyone understands the security
protocols and knows how to respond to different
threats.
7. Resource Allocation:
o Adequate resources, including financial,
technological, and human resources, are allocated to
ensure the successful implementation of security
measures.
8. Monitor and Review:
o Continuous monitoring of security activities ensures
that the security measures are effective. Regular
reviews help identify gaps or areas for improvement.