100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025

Rating
-
Sold
1
Pages
19
Grade
A+
Uploaded on
21-09-2025
Written in
2025/2026

SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 21, 2025
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEP3714 Assignment 2
(COMPLETE ANSWERS)
Semester 2 2025 - DUE
22 September 2025
[Document subtitle]




[School]
[Course title]

,SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025

 Course

 Security Risk Control Measures II (SEP3714)

 Institution

 University Of South Africa (Unisa)

 Book

 Security Risk Management Body of Knowledge

SEP3714 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 22 September 2025;
100% TRUSTED Complete, trusted solutions and explanations.



a senior security officer (SSO), your client has requested that you implement specific security
risk control measures to assist in preventing or minimising future losses to the company due to
theft, collusion and/or any other loss-relating threats. Demonstrate, by providing eight (8)
practical examples and/or steps that you would follow, regarding how you would implement
and evaluate the security project.

ight (8) Practical Security Risk Control Measures with Implementation & Evaluation Steps

1. Conduct a Security Risk Assessment

o Implementation: Identify vulnerable areas (e.g., storerooms, IT systems, cash-
handling points) through site surveys, interviews, and incident report analysis.

o Evaluation: Compare the number and severity of reported incidents before and
after risk assessment to see if identified weaknesses were addressed.

2. Strengthen Access Control Systems

o Implementation: Introduce ID badges, biometric systems, CCTV-monitored entry
points, and restricted access zones for sensitive areas.

o Evaluation: Monitor access logs and incident trends to ensure only authorised
personnel are entering restricted areas.

3. Install and Upgrade Surveillance Systems

o Implementation: Place CCTV cameras in high-risk areas (warehouses, cash offices,
loading bays) and ensure proper lighting to deter theft and collusion.

, o Evaluation: Review footage regularly and track if the presence of cameras has
reduced suspicious behaviour or theft attempts.

4. Develop and Enforce Security Policies

o Implementation: Draft clear anti-theft, anti-collusion, and whistleblowing
policies, communicate them to staff, and integrate them into contracts and
induction training.

o Evaluation: Conduct policy compliance audits and measure staff awareness
through periodic surveys or quizzes.

5. Staff Vetting and Screening Procedures

o Implementation: Implement pre-employment background checks, criminal
record verification, and periodic re-screening of staff in sensitive roles.

o Evaluation: Track whether incidents involving insider threats reduce after stricter
vetting measures are introduced.

6. Regular Security Awareness Training

o Implementation: Conduct training sessions for staff on ethics, reporting
suspicious behaviour, and procedures for handling theft/collusion risks.

o Evaluation: Use post-training assessments and monitor incident reporting rates
to determine the effectiveness of training.

7. Introduce Monitoring and Reporting Mechanisms

o Implementation: Establish anonymous reporting hotlines, suggestion boxes, and
regular audits to detect collusion or theft.

o Evaluation: Measure the number of reports received and analyse whether early
detection of risks has improved.

8. Periodic Security Audits and Project Review

o Implementation: Carry out scheduled and surprise audits of stock, cash handling,
and sensitive processes to detect irregularities.

o Evaluation: Compare audit findings over time and assess whether the frequency
and scale of losses have decreased.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
istudy1 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
41
Member since
1 year
Number of followers
0
Documents
128
Last sold
1 month ago

3,6

9 reviews

5
3
4
3
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions