100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEP3701 Assignment 2 Semester 1 Memo | Due 29 April 2025

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
28-04-2025
Written in
2024/2025

SEP3701 Assignment 2 Semester 1 Memo | Due 29 April 2025. All questions fully answered. QUESTION 1 1. Draft the Unisa Security Risk Management Model and give reasons for the addition of steps 9 and 10 respectively. QUESTION 2 2. Discuss the sociological factors that causes crime (do not copy examples from your study guide). QUESTION 3 3. Calculate a risk factor using a matrix on a total scale of 5. Probability factor is 2 and the impact factor is 4. QUESTION 4 4. Discuss all the secondary sources of obtaining information, which will be used for the crime risk analysis and as supportive evidence. (do not copy examples from your study guide) (15) QUESTION 5 5. Distinguish between an on-site orientation and a security survey.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 28, 2025
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, PLEASE USE THIS DOCUMENT AS A GUIDE TO ANSWER YOUR ASSIGNMENT

 QUESTION 1

1. Draft the Unisa Security Risk Management Model and give reasons for the addition of steps 9
and 10 respectively.

The Unisa Security Risk Management Model
The Unisa Security Risk Management Model is based primarily on the work of Rogers, who
developed a structured approach to security risk management that is widely used at the University of
South Africa (Unisa). Rogers’ model includes several key steps.

 Step 1 involves identifying the factors that cause crime, which is essential for understanding
where vulnerabilities might exist.
 Step 2 covers the development of a security policy and securing a mandate from management,
providing the authority needed for implementing security measures.
 Step 3 is the orientation phase, where an initial meeting with the client and a site inspection are
conducted to identify assets and assess risks.
 Step 4, the risk analysis exercise, involves calculating the probability and potential impact of
identified risks.
 Step 5 is a security survey, focusing on inspecting existing security measures and identifying
weaknesses.
 Step 6 is the development of security risk control measures aimed at addressing the risks
identified.
 Step 7 evaluates the return on investment by analyzing the cost-effectiveness of the proposed
measures.
 Step 8 requires compiling a security risk management report that documents all findings and
recommendations.
 Step 9 involves the implementation and evaluation of security measures, ensuring that the
proposed solutions are put into practice and that their effectiveness is measured over time.

Addition of Step 9: Implementation and Evaluation of Security Measures
Step 9, the implementation and evaluation of security measures, is critical because developing
security recommendations alone is not sufficient; they must be actively applied and tested for
effectiveness. Without implementation, the security risk management process would remain
theoretical and have no real impact on crime prevention or risk reduction. Furthermore, evaluation
ensures that implemented measures are not only operational but are achieving the intended outcomes.
It allows for adjustments and improvements where needed, making the security system dynamic
rather than static.

Addition of Step 10: Maintenance and Upgrade
The addition of Step 10, maintenance and upgrade, was introduced by Olckers in response to the
practical realities observed in residential and business security environments. Olckers recognized
that many security systems, once installed, tend to be neglected, leading to system failures or
vulnerabilities as threats evolve. Step 10 stresses the importance of ongoing maintenance, regular
inspections, and timely upgrades of security systems. This ensures that security measures remain
effective over time and adapt to new risks or changes in the environment. Without this step,
organizations might experience a false sense of security, only realizing deficiencies after an incident
has occurred. Therefore, maintenance and upgrading are crucial for sustaining long-term operational
effectiveness and ensuring that security investments continue to deliver value.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Aimark94 University of South Africa (Unisa)
View profile
Follow You need to be logged in order to follow users or courses
Sold
6576
Member since
6 year
Number of followers
3168
Documents
1328
Last sold
2 days ago
Simple & Affordable Study Materials

Study Packs & Assignments

4,2

520 reviews

5
277
4
124
3
74
2
14
1
31

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions