100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEP3701 Assignment 2 (COMPLETE GUIDELINE) Semester 1 2025 - DUE 29 April 2025; 100% TRUSTED Complete, trusted solutions and explanations.

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
28-04-2025
Written in
2024/2025

SEP3701 Assignment 2 (COMPLETE GUIDELINE) Semester 1 2025 - DUE 29 April 2025; 100% TRUSTED Complete, trusted solutions and explanations.

Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Institution
Course

Document information

Uploaded on
April 28, 2025
Number of pages
26
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

,SEP3701 Assignment 2 (COMPLETE GUIDELINE)
Semester 1 2025 - DUE 29 April 2025; 100% TRUSTED
Complete, trusted solutions and explanations.


QUESTION 1
Draft the Unisa Security Risk Management Model and give
reasons for the addition of steps 9 and 10 respectively. (10)
ANSWER

UNISA Security Risk Management Model
The University of South Africa (UNISA) Security Risk
Management Model aims to identify, assess, manage, and
mitigate risks associated with security within the university
environment. The model is designed to enhance the safety of
staff, students, and the university's physical and digital
infrastructure.
Steps in the UNISA Security Risk Management Model:
1. Identify Security Risks:
o This is the first and foremost step where all potential

security threats and vulnerabilities that may affect the
university community are identified. This includes
physical threats (e.g., intrusions, vandalism) and cyber
threats (e.g., data breaches, hacking).
2. Risk Assessment:
o After identifying risks, the next step is to assess the

likelihood and potential impact of each identified risk.

, This helps prioritize which risks need to be addressed
urgently.
3. Risk Evaluation:
o In this step, the risks are categorized (e.g., low,

medium, high) based on their potential impact and
likelihood. The evaluation helps in allocating
resources to manage high-priority risks.
4. Design and Implement Security Strategies:
o The university develops strategies to mitigate or

eliminate the risks. This includes implementing
security technologies, protocols, and policies (e.g.,
surveillance systems, access control).
5. Create a Security Policy Framework:
o A formalized security policy is created that outlines

the responsibilities, procedures, and protocols for
managing security risks at UNISA. This policy acts as
a guide for all stakeholders.
6. Training and Awareness Programs:
o Training programs for staff, students, and faculty are

critical to ensure everyone understands the security
protocols and knows how to respond to different
threats.
7. Resource Allocation:
o Adequate resources, including financial,

technological, and human resources, are allocated to
ensure the successful implementation of security
measures.
8. Monitor and Review:
o Continuous monitoring of security activities ensures

that the security measures are effective. Regular
reviews help identify gaps or areas for improvement.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LearnedWriter University of south africa
Follow You need to be logged in order to follow users or courses
Sold
894
Member since
2 year
Number of followers
94
Documents
1174
Last sold
3 weeks ago
LearnedWriter

On this page you will find all documents offered by seller LearnedWriter.

4.1

107 reviews

5
57
4
21
3
20
2
5
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions