100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEP2606 Assignment 2 (DETAILED ANSWERS) Semester 2 2025 - DISTINCTION GUARANTEED

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
26-09-2025
Written in
2025/2026

SEP2606 Assignment 2 (DETAILED ANSWERS) Semester 2 2025 - DISTINCTION GUARANTEED - DISTINCTION GUARANTEED - DISTINCTION GUARANTEED Answers, guidelines, workings and references ,... Compulsory assessment: Assessment 02 SEP Due date: Thursday, 02 October 2025, 23:00 SECTION A - WRITTEN ASSIGNMENT As a student at a tertiary institution, we expect you to do independent research (collecting information on your subject) and then produce your own answers of a high standard. This means that you must do extra reading besides just reading your study guide. For this assignment you must consult various sources of information and paraphrase (using your own words), analyse, interpret and reference all the information that you collected during the research. Please make sure that you read the guidelines in the Tutorial letter 301 on how to approach Assignment 02 carefully before you start assessment 2. Also be sure to use the referencing Tutorial letter 301 (SCHJALL/301/4/2025) for correct referencing methods. bQUESTION 1 Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2) Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2) Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2)

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 26, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SEP2606
Assignment 2 Semester 2 2025

Due Date: 2 October 2025

Detailed solutions, explanations, workings
and references.

+27 81 278 3372

, QUESTION 1

After risks are identified and vulnerabilities assessed, management must decide how
to respond in order to safeguard organisational assets. According to Rogers, Van
Schalkwyk, and Ngoveni (2017), there are four cost-effective decisions available to
management, commonly referred to as the “four Ts” of risk management: terminate,
tolerate, transfer, and treat.

The first option, terminate, involves stopping the risky activity altogether. This is
chosen when the potential consequences are too severe to justify continuation. For
example, if delivery trucks are repeatedly hijacked in a high-crime zone, a company
may decide to terminate deliveries to that area and instead require customers to
collect goods at a safer location (Rogers et al., 2017).

The second option, tolerate, is selected when the risk is minor and not worth the
cost of implementing controls. For instance, the occasional loss of office stationery
may be tolerated as the cost of control would outweigh the benefit. However,
tolerance must be balanced, as small losses can escalate if not monitored (Rogers
et al., 2017).

The third option, transfer, occurs when responsibility for the risk is shifted to a third
party. This is commonly done through insurance or outsourcing. For example,
contracting a cash-in-transit company to transport money reduces the organisation’s
direct exposure (Rogers et al., 2017).

Finally, treat involves implementing control measures to minimise risk. Examples
include installing CCTV, access control systems, and alarm-linked tagging devices in
retail environments. This option is often the most practical and ensures that threats
are managed at their root cause (Rogers et al., 2017).




QUESTION 2



Security Measures Costs
Security policies These are the least expensive and most often overlooked security


Varsity Cube 2025 +27 81 278 3372

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
VarsityC AAA School of Advertising
View profile
Follow You need to be logged in order to follow users or courses
Sold
28682
Member since
8 year
Number of followers
13258
Documents
3117
Last sold
12 hours ago

4,1

2819 reviews

5
1490
4
581
3
392
2
117
1
239

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions