SEP3714 Assignment 2
(COMPLETE ANSWERS)
Semester 2 2025 - DUE
22 September 2025
[Document subtitle]
[School]
[Course title]
,SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025
Course
Security Risk Control Measures II (SEP3714)
Institution
University Of South Africa (Unisa)
Book
Security Risk Management Body of Knowledge
SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025;
100% TRUSTED Complete, trusted solutions and explanations.
aAsa senior security officer (SSO), your client has requested that you implement specific
security risk control measures to assist in preventing or minimising future losses to the company
due to theft, collusion and/or any other loss-relating threats.
Demonstrate, by providing eight (8) practical examples and/or steps that you would follow,
regarding how you would implement and evaluate the security project. [8]
Eight Practical Steps a Senior Security Officer Would Take to Implement and Evaluate Security
Risk Control Measures
1. Conduct a Security Risk Assessment
o Identify existing and potential threats such as theft, collusion, fraud, and
sabotage.
o Assess the company’s vulnerabilities and evaluate the likelihood and impact of
risks.
2. Develop and Implement Security Policies and Procedures
o Draft clear guidelines on access control, reporting theft, and handling suspicious
activities.
o Ensure all staff understand and sign compliance agreements.
3. Introduce Access Control Systems
, o Implement electronic access cards, biometric systems, or visitor logs to limit and
monitor entry to sensitive areas.
o Regularly audit and update access rights.
4. Install and Monitor Surveillance Systems
o Use CCTV cameras in high-risk zones (warehouses, cash-handling areas, exits).
o Establish a monitoring centre and review footage frequently to detect
irregularities.
5. Enhance Staff Vetting and Screening Processes
o Conduct thorough background checks on all employees, contractors, and
suppliers.
o Reassess employees periodically, especially those in high-risk positions.
6. Implement Security Awareness and Training Programs
o Educate staff on theft-prevention, fraud detection, and ethical conduct.
o Encourage reporting of suspicious activities through whistle-blower policies.
7. Introduce Monitoring, Auditing, and Reporting Mechanisms
o Carry out regular audits of financial records, stock inventories, and security
reports.
o Establish incident reporting channels and promptly investigate any irregularities.
8. Evaluate and Review the Security Project
o Continuously monitor the effectiveness of the measures put in place.
o Gather feedback from management, staff, and security personnel.
o Adjust strategies and upgrade systems where weaknesses are identified.
✅
QUESTION 2 You are employed as a security supervisor in the retail sector, selling camping
equipment. Compose a valid argument in which you explain and identify to one of the sales
representatives the difference between the terms “maximum foreseeable loss” (MFL), “normal
(COMPLETE ANSWERS)
Semester 2 2025 - DUE
22 September 2025
[Document subtitle]
[School]
[Course title]
,SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025
Course
Security Risk Control Measures II (SEP3714)
Institution
University Of South Africa (Unisa)
Book
Security Risk Management Body of Knowledge
SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025;
100% TRUSTED Complete, trusted solutions and explanations.
aAsa senior security officer (SSO), your client has requested that you implement specific
security risk control measures to assist in preventing or minimising future losses to the company
due to theft, collusion and/or any other loss-relating threats.
Demonstrate, by providing eight (8) practical examples and/or steps that you would follow,
regarding how you would implement and evaluate the security project. [8]
Eight Practical Steps a Senior Security Officer Would Take to Implement and Evaluate Security
Risk Control Measures
1. Conduct a Security Risk Assessment
o Identify existing and potential threats such as theft, collusion, fraud, and
sabotage.
o Assess the company’s vulnerabilities and evaluate the likelihood and impact of
risks.
2. Develop and Implement Security Policies and Procedures
o Draft clear guidelines on access control, reporting theft, and handling suspicious
activities.
o Ensure all staff understand and sign compliance agreements.
3. Introduce Access Control Systems
, o Implement electronic access cards, biometric systems, or visitor logs to limit and
monitor entry to sensitive areas.
o Regularly audit and update access rights.
4. Install and Monitor Surveillance Systems
o Use CCTV cameras in high-risk zones (warehouses, cash-handling areas, exits).
o Establish a monitoring centre and review footage frequently to detect
irregularities.
5. Enhance Staff Vetting and Screening Processes
o Conduct thorough background checks on all employees, contractors, and
suppliers.
o Reassess employees periodically, especially those in high-risk positions.
6. Implement Security Awareness and Training Programs
o Educate staff on theft-prevention, fraud detection, and ethical conduct.
o Encourage reporting of suspicious activities through whistle-blower policies.
7. Introduce Monitoring, Auditing, and Reporting Mechanisms
o Carry out regular audits of financial records, stock inventories, and security
reports.
o Establish incident reporting channels and promptly investigate any irregularities.
8. Evaluate and Review the Security Project
o Continuously monitor the effectiveness of the measures put in place.
o Gather feedback from management, staff, and security personnel.
o Adjust strategies and upgrade systems where weaknesses are identified.
✅
QUESTION 2 You are employed as a security supervisor in the retail sector, selling camping
equipment. Compose a valid argument in which you explain and identify to one of the sales
representatives the difference between the terms “maximum foreseeable loss” (MFL), “normal