100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

SEP2606 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 2 October 2025

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
26-09-2025
Geschreven in
2025/2026

SEP2606 Assignment 2 (COMPLETE ANSWERS) Semester 2 2025 - DUE 2 October 2025; 100% TRUSTED Complete, trusted solutions and explanations. For assistance, Whats-App 0.6.7-1.7.1-1.7.3.9. Ensure your success with us.. Compulsory assessment: Assessment 02 SEP Due date: Thursday, 02 October 2025, 23:00 SECTION A - WRITTEN ASSIGNMENT As a student at a tertiary institution, we expect you to do independent research (collecting information on your subject) and then produce your own answers of a high standard. This means that you must do extra reading besides just reading your study guide. For this assignment you must consult various sources of information and paraphrase (using your own words), analyse, interpret and reference all the information that you collected during the research. Please make sure that you read the guidelines in the Tutorial letter 301 on how to approach Assignment 02 carefully before you start assessment 2. Also be sure to use the referencing Tutorial letter 301 (SCHJALL/301/4/2025) for correct referencing methods. bQUESTION 1 Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2) Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2) Define the term “risk management” and provide your own examples. (3) QUESTION 2 Name and explain four decisions management can make to manage risk cost-effectively. (4) QUESTION 3 Indicate the aspects that you would include in the body of the report that has to be submitted to top management. (7) QUESTION 4 As a security manager tasked with assessing security measures, discuss in a diagram format the security risk management model for private security managers. (11) SECTION A: 25 Marks SECTION B – ESSAY Fire ravages South African Parliament In the early hours of Sunday morning, 2 January 2022 around, 3:00 a.m. a fire broke out at the South African Parliament building in Cape Town. The fire started in the third story of the Parliament building that is located behind the National Assembly building. According to fire fighters, the blaze has caused widespread damage, spreading to the wing housing the current National Assembly, where parliamentarian conduct their daily duties. Emergency crews were sent to the scene to bring the fire under control, while the blaze already This study source was downloaded by from CourseH on :03:03 GMT -05:00 2 destroyed the roof of one area. A man as a suspect has been arrested and charged with various crimes such arson and terrorism in connection with the blaze. The case of arson and terrorism is still pending (DW News, 2022). Based on the information above, in your own words, write an essay and answer the following questions: a) Discuss the predisposing factors in detail. (8) b) Explain in detail the important objectives of environmental design. After identifying the risks facing your client’s organisation and pinpointing vulnerabilities in its security system, management must take steps to determine effective measures to safeguard the organisation’s assets. Discuss four decisions management can make to manage security risks, cost-effectively, and provide your own practical examples. c) Owing to the crime discussed above, the probability of crime taking place is 2, whereas the impact is 3. On the basis of the scenario above, calculate the risk factor, and indicate how you arrived to the answer. (9) 1. Which one of the following options is an added cost to an organisation? 1. Recruitment process (2) 2. Poor risk control measures (2) 3. Hiring of top management (2) 4. Risk (2) 2. Which one of the following serves as the heart of all security measures? 1. Security control room (2) 2. Closed circuit television (2) 3. Security officials (2) 4. Physical security measures (2) Security measures are important to protect assets, people, and information within an organisation. These measures can be categorised based on their function, and each category involves different levels of costs depending on technology, human resources, and maintenance requirements. In a table format, discuss the categories of security measures along with their associated costs. ( 1. Environmental factors (2) 2. Impact factors (2) 3. Risk factors (2) 4. Precipitating factor (2) 4. Which institution in South Africa is currently responsible for ensuring compliance of all registered private security companies? 1. Security Industry Alliance (2) 2. South African Bureau of Standards (2) 3. Security Officers Board (2) 4. Private Security Industry Regulatory Authority (2) 5. Robbery is a crime of extreme violence in which the perpetrator (criminal) is desperate, aggressive and determined to obtain an asset (cash, cameras, cellphones, computers, cars, jewelry and/or watches) by means of force. The company is tasking you to conduct robbery awareness training to help the staff be prepared both psychologically and physically should a robbery occur. In your own words, outline five key security measures that employees should observe during a robbery. 1. an introduction, report body, content of report and conclusion. (2) 2. an introduction, definition, report body and conclusion, recommendations. (2) 3. an introduction, definition, report body, content of report and conclusion. (2) 4. an introduction, report body, content of report and recommendations. (2) 6. Which one of the following options implies an urban planning and design process that integrates conventional crime prevention with neighbourhood design and urban development? 1. Electric fencing (2) 2. An environmental design supported with high walls (2) 3. An environmental design (2) 4. Security design (2) 7. Identify the term that means “secret or not visible”: 1. Undercover investigation (2) 2. Shrinkage (2) 3. Zoning (2) 4. Clandestine (2) 8. Case study You are the security manager employed at a large cold-storage facility that houses multiple warehouses. One of these warehouses stores fruit and vegetables and has been repeatedly broken into by street children, who appear to be hungry and searching for food. However, the damage they cause to the building is far greater than the value of the stolen goods. The street children gain access through several loopholes, including unprotected windows, water pipes leading to the premises and by climbing pipes onto the roof, where they then enter the warehouse. There are no burglar bars on the windows, making unauthorised entry relatively easy. In addition, the facility experiences the theft of goods being transported to and from the cold storage premises. Their transport vehicles are being hijacked by criminals using extreme violence that poses a serious threat to personnel and property. Furthermore, staff members who work night shift are robbed at gun point of their belongings such as cell phones at the facility gate, which does not have CCTV camera surveillance or security officers posted. These security threats emphasise the need for immediate and effective security measures. 3 The warehouse manager has given you a clear directive: “Sort out the problem or lose your position as the security manager”. You must take decisive action to prevent further potential crimes and enhance the overall security at the facility. Based on the information above, write an essay incorporating the following elements: (a) Identify, define and give practical examples of two crimes that occurred at the cold-storage facility. (6) (b) Before you decide on a specific security measure to implement at the cold-storage facility, you must ask yourself how the security measure will contribute to achieving the specific objectives of security. Briefly discuss eight objectives of security measures and supply one example of each objective. (16) (c) Owing to the crime discussed above, the probability of crime taking place at this cold-storage facility is four (4), whereas the impact therefore is two (2). Based on the information provided, calculate the risk factor, and indicate how you have arrived at the answer. 1. Shoplifting (2) 2. Burglary (2) 3. Bank robbery (2) 4. Smash and grab (2) 9. From the options mentioned below, identify what is regarded as an important and specialised subfield of the broad discipline of risk management. 1. Risk assessment (2) 2. Security review (2) 3. Security (2) 4. Access control (2) 10. Which one of the following refers to an action that means being able to keep an eye on the entire environment without taking special measures to do so? 1. Territoriality (2) 2. Natural surveillance (2) 3. Natural access control (2) 4. Physical security environment (2) 11. Who has the authority to receive the final dedicated security report from the project manager? 1. The Union (2) 2. The Human Resource Department (2) 3. The organisation’s top management (2) 4. The organisation’s employee’s supervisor (2) 12. …is defined as the intellectual property of its owners and has a commercial value 1. Private property (2) 2. Security standard (2) 3. Security standard and policy (2)

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Gekoppeld boek

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
26 september 2025
Aantal pagina's
10
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SEP2606
Assignment 2 Semester 2 2025
Unique number:
Due Date: 2 October 2025

QUESTION 1

After risks are identified and vulnerabilities assessed, management must decide how to
respond in order to safeguard organisational assets. According to Rogers, Van Schalkwyk,
and Ngoveni (2017), there are four cost-effective decisions available to management,
commonly referred to as the “four Ts” of risk management: terminate, tolerate, transfer, and
treat.

The first option, terminate, involves stopping the risky activity altogether. This is chosen
when the potential consequences are too severe to justify continuation. For example, if
delivery trucks are repeatedly hijacked in a high-crime zone, a company may decide to
terminate deliveries to that area and instead require customers to collect goods at a safer
location (Rogers et al., 2017).

The second option, tolerate, is selected when the risk is minor and not worth the cost of
implementing controls. For instance, the occasional loss of office stationery may be tolerated
as the cost of control would outweigh the benefit. However, tolerance must be balanced, as
Terms of use
small losses can escalate if not monitored (Rogers et al., 2017).
By making use of this document you agree to:
 Use this document as a guide for learning, comparison and reference purpose,
Terms of use
 Not to duplicate, reproduce and/or misrepresent the contents of this document as your own work,
By making use of this document you agree to:
 Use this document
Fully accept the consequences
solely as a guide forshould you plagiarise
learning, reference,or and
misuse this document.
comparison purposes,
 Ensure originality of your own work, and fully accept the consequences should you plagiarise or misuse this document.
 Comply with all relevant standards, guidelines, regulations, and legislation governing academic and written work.

Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is" without any express or
implied representations or warranties. The author accepts no responsibility or liability for any actions taken based on the
information contained within this document. This document is intended solely for comparison, research, and reference purposes.
Reproduction, resale, or transmission of any part of this document, in any form or by any means, is strictly prohibited.

, +27 67 171 1739



QUESTION 1

After risks are identified and vulnerabilities assessed, management must decide how
to respond in order to safeguard organisational assets. According to Rogers, Van
Schalkwyk, and Ngoveni (2017), there are four cost-effective decisions available to
management, commonly referred to as the “four Ts” of risk management: terminate,
tolerate, transfer, and treat.

The first option, terminate, involves stopping the risky activity altogether. This is
chosen when the potential consequences are too severe to justify continuation. For
example, if delivery trucks are repeatedly hijacked in a high-crime zone, a company
may decide to terminate deliveries to that area and instead require customers to
collect goods at a safer location (Rogers et al., 2017).

The second option, tolerate, is selected when the risk is minor and not worth the
cost of implementing controls. For instance, the occasional loss of office stationery
may be tolerated as the cost of control would outweigh the benefit. However,
tolerance must be balanced, as small losses can escalate if not monitored (Rogers
et al., 2017).

The third option, transfer, occurs when responsibility for the risk is shifted to a third
party. This is commonly done through insurance or outsourcing. For example,
contracting a cash-in-transit company to transport money reduces the organisation’s
direct exposure (Rogers et al., 2017).

Finally, treat involves implementing control measures to minimise risk. Examples
include installing CCTV, access control systems, and alarm-linked tagging devices in
retail environments. This option is often the most practical and ensures that threats
are managed at their root cause (Rogers et al., 2017).




QUESTION 2




Security Measures Costs

Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is"
without any express or implied representations or warranties. The author accepts no responsibility or
liability for any actions taken based on the information contained within this document. This document is
intended solely for comparison, research, and reference purposes. Reproduction, resale, or transmission
of any part of this document, in any form or by any means, is strictly prohibited.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EduPal University of South Africa (Unisa)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
149181
Lid sinds
7 jaar
Aantal volgers
35996
Documenten
4338
Laatst verkocht
13 uur geleden

4,2

13562 beoordelingen

5
7808
4
2689
3
1791
2
455
1
819

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen