100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

SEP3714 Assignment 2 (ANSWERS) Semester 2 2025 - DISTINCTION GUARANTEED

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
21-09-2025
Written in
2025/2026

Well-structured SEP3714 Assignment 2 (ANSWERS) Semester 2 2025 - DISTINCTION GUARANTEED. (DETAILED ANSWERS - DISTINCTION GUARANTEED!)..... As a senior security officer (SSO), your client has requested that you implement specific security risk control measures to assist in preventing or minimising future losses to the company due to theft, collusion and/or any other loss-relating threats. Demonstrate, by providing eight (8) practical examples and/or steps that you would follow, regarding how you would implement and evaluate the security project. [8] QUESTION 2 You are employed as a security supervisor in the retail sector, selling camping equipment. Compose a valid argument in which you explain and identify to one of the sales representatives the difference between the terms “maximum foreseeable loss” (MFL), “normal loss expectancy” (NLE) and “annual loss expectancy” (ALE) and, using practical examples, apply it to the camping retail store where you are employed. [6] SEP3714/2025 3 QUESTION 3 Top management at your workplace is implementing a state-of-the-art access control system linked to time and attendance at Human Resources. As a security manager tasked to implement the new system, you have noted that some employees are reluctant to accept this new security measure. Using practical examples, describe certain matters you will attend to with the purpose of overcoming workers’ reluctance to organisational change. [10] QUESTION 4 Your colleague has been called in to conduct a security survey at one of the branches of your company, Simba Peanut Manufacturing. A few years ago, you conducted a security survey of the security lighting at the client’s premises. Discuss ten (10) further guidelines for conducting a security survey with your colleague before she can start the assigned work . [10] QUESTION 5 You have been called in to conduct a security survey at one of the branches of your company, Simba Peanut Manufacturing. You have just conducted a security survey of the security lighting at the branch’s premises. Ninety security measures (questions) were recorded on the survey sheet (so 90 questions represent 100%). Your survey sheet contains 60 “yes” answers and 30 “no” answers. Calculate the security weakness factor that you determined. [6] QUESTION 6 Management principles such as leading, organising, planning and control, as well as financial business principles must be applied to the discipline of risk control. Risk management consequently deals not only with crime risks per se, but with all risks facing an organisation as on ongoing concern. Design and compose these various risks that an organisation may face and must deal with, as well as successfully conclude with recommendations to management as to how to identify and treat them in a timeously fashion. [10] Section A: 50 marks SEP3714/2025 4 SECTION B: ESSAY-TYPE QUESTION QUESTION 7 CASE STUDY: Drug and alcohol abuse at the workplace Drug and alcohol use among employees affects the workplace, even when an employee is not actively abusing drugs or alcohol at work or coming to work under the influence of a substance (Murphy 2023). As a person’s addiction to drugs or alcohol advances, more areas of their life, functioning and health are impacted, causing a ripple effect that can begin to affect their job. Murphy (2023) identifies the following as the main areas that are affected by drug and alcohol use in the workplace: • premature death, chronic health issues and increased medical costs • increased risk for workplace injuries, accidents, and non-work injuries • increased rates of absenteeism and overuse of sick and paid leave • loss of productivity, impaired performance, and lower quality of work You are a security officer at a large explosives factory that employs 12 000 shift workers. The factory has a problem with drug and alcohol abuse among its employees. This is especially visible on Mondays after the end of the month, when up to 10% of staff members are absent from work. Your manager instructs you to make recommendations as to how this problem can be solved. Use the information above to answer the following questions: 7.1 In your own words, differentiate between drugs, drug abuse and a drug addict and give practical examples. [12] 7.2 Identify and briefly explain the guidelines as to how security officers should conduct themselves in a professional manner when dealing with drug abusers in the workplace. [10] 7.3 Indicate to your employer what you regard as most important drug detection and prevention measures to as part of the drug abuse prevention programme. [14] 7.4 Explain to top management the benefits of a drug abuse prevention programme. [4]

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 21, 2025
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEP3714
Assignment 2 Semester 2 2025
2 2025
Unique Number:
Due date: 22 September 2025
SECTION A




QUESTION 1: Eight practical steps to implement and evaluate the security project

As a senior security officer, when setting up security measures to stop theft, collusion, or
losses, I would follow these steps:

1. Do a risk assessment – I would first identify what assets are at risk, such as money,
stock, data, and equipment, and where threats are coming from (inside or outside the
company).

2. Check current security – I would look at what security is already in place and see
what works and what doesn’t. For example, if CCTV cameras are working properly or
if access control is missing.

3. Set goals – I would work with management to set clear goals, like reducing theft by
50% in six months.
DISCLAIMER & TERMS OF USE
 Educational Aid: These study notes are intended to be used as educational resources and should not be seen as a
replacement for individual research, critical analysis, or professional consultation. Students are encouraged to perform
their own research and seek advice from their instructors or academic advisors for specific assignment guidelines.
 Personal Responsibility: While every effort has been made to ensure the accuracy and reliability of the information in
these study notes, the seller does not guarantee the completeness or correctness of all content. The buyer is
responsible for verifying the accuracy of the information and exercising their own judgment when applying it to their
assignments.
 Academic Integrity: It is essential for students to maintain academic integrity and follow their institution's policies
regarding plagiarism, citation, and referencing. These study notes should be used as learning tools and sources of
inspiration. Any direct reproduction of the content without proper citation and acknowledgment may be considered
academic misconduct.
 Limited Liability: The seller shall not be liable for any direct or indirect damages, losses, or consequences arising from
the use of these notes. This includes, but is not limited to, poor academic performance, penalties, or any other negative
consequences resulting from the application or misuse of the information provided.

, For additional support +27 81 278 3372

SECTION A




QUESTION 1: Eight practical steps to implement and evaluate the security
project

As a senior security officer, when setting up security measures to stop theft,
collusion, or losses, I would follow these steps:

1. Do a risk assessment – I would first identify what assets are at risk, such as
money, stock, data, and equipment, and where threats are coming from
(inside or outside the company).

2. Check current security – I would look at what security is already in place
and see what works and what doesn’t. For example, if CCTV cameras are
working properly or if access control is missing.

3. Set goals – I would work with management to set clear goals, like reducing
theft by 50% in six months.

4. Choose the right security measures – Based on the risks, I would
recommend strong access control, better lighting, trained security guards,
alarms, and monitoring systems.

5. Train staff – Employees need to be taught how to use the systems. For
example, how to report suspicious activity and why certain access areas are
restricted.

6. Create a security policy – A clear written policy will help everyone
understand the rules. It should cover entry procedures, visitor rules, and how
to handle emergencies.

7. Monitor and adjust – I would regularly check the effectiveness of the new
systems. Are alarms working? Are security staff doing patrols? Are people
following the new rules?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Edge
View profile
Follow You need to be logged in order to follow users or courses
Sold
9821
Member since
2 year
Number of followers
4253
Documents
2736
Last sold
2 hours ago

4,2

1199 reviews

5
672
4
241
3
185
2
28
1
73

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions