Assessor Resource

CPPSEC4007A
Assess threat

Assessment tool

Version 1.0
Issue Date: April 2024


This unit of competency has application in those work roles involving the assessment of threats in a security environment. Competency requires legal and operational knowledge applicable to relevant sectors of the security industry. The knowledge and skills described in this unit are to be applied within relevant legislative and organisational guidelines.

This unit of competency specifies the outcomes required to assess current, future and potential threats to identified assets or activities. It requires the ability to undertake an assessment of client operations, identify and analyse potential or existing threats, undertake a consequence analysis and present assessment findings.

This unit may form part of the licensing requirements for persons engaged in threat assessment operations in those states and territories where these are regulated activities.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)

Prerequisites

Not Applicable


Employability Skills

This unit contains employability skills.




Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

accurately reviewing and preparing assessment findings in a format suitable for presentation

analysing consequences of potential or existing threats, and measuring and determining their criticality to client operations

identifying appropriate contingency requirements on the basis of an accurate assessment of all factors

identifying causes and sources of potential or existing threats, and assessing the level, likelihood and impact of such threats on the basis of valid and verifiable information using agreed assessment criteria, techniques and processes

obtaining information from a range of sources and consultative processes to ensure an accurate understanding of the threats to operational environment and core business operations of the client.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

This section describes the skills and knowledge and their level required for this unit.

Required skills

access stored information

accurately identify existing or potential threats

apply reasoning and logical analysis to make decisions and solve problems

coaching and mentoring to provide support to colleagues

communicate in a clear and concise manner both orally and in writing

obtain information using appropriate communication skills including interviewing, questioning and customer relations

prepare and present verbal and written reports

prioritise tasks and organise schedules

relate to persons of different social and cultural backgrounds and of varying physical and mental abilities

research and analyse information

use basic statistics

use information technology.

Required knowledge

client and organisational confidentiality policies

concept of litigation

distinction between information and intelligence

organisational goals and objectives, activities and systems

principles of AS/NZS 4360: 2004 Risk management and related guidelines

principles of effective communication

relevant industry codes of practice and standards

relevant legislation and regulations including Occupational Health and Safety (OHS)

security risk management

threat assessment techniques and processes.

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirements may relate to:

apprehension and powers of arrest

Australian standards and quality assurance requirements

counter-terrorism

crowd control and control of persons under the influence of intoxicating substances

force continuum, use of force guidelines

general 'duty of care' responsibilities

inspection of people and property, and search and seizure of goods

licensing or certification requirements

privacy and confidentiality

relevant commonwealth, state and territory legislation, codes and national standards for:

anti-discrimination

cultural and ethnic diversity

environmental issues

equal employment opportunity

industrial relations

OHS

relevant industry codes of practice

trespass and the removal of persons

use of restraints and weapons:

batons

firearms

handcuffs

spray.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

OHS policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Relevant standards:

must include AS/NZS 4360: 2004 Risk management

may relate to:

AS2630-1983 Guide to the selection and application of intruder alarm systems for domestic and business premises

HB 167:2006 Security Risk Management

HB 436 Risk Management Guidelines - Companion to AS/NZS 4360

HB 231:2000 Information security risk management guidelines.

Clientsmay include:

employer and employee groups

individuals

political parties

public and private entities

trade or professional associations.

Relevant personsmay include:

manufacturers

other professional, specialist or technical staff

security consultants

security personnel

supervisors.

Relevant informationmay include:

client activities and functions

client business and operational plans

client current and proposed operating environment, assets and systems

existing client security management strategies

history of incidents

potential risks and threats experienced by similar organisations

terms of reference.

Sourcesof information may include:

annual reports

competitors

current and past employees of the company, like organisation or like industry

field experts (for example qualified technicians)

government agencies

internet

media (journals, TV, radio, magazines)

newspaper articles

organisational records

police

research papers

security contractors or consultants

security industry associations

service providers

similar organisations and industries (domestic and international).

Assetsmay include:

business plans

equipment

facilities

goodwill

information, information systems and sources

intellectual property

output

people

reputation

systems

work processes and practices.

Threats may:

affect the security of an asset

be an agent or event that could put an asset at risk (theft, vandalism, fire, flood, power loss, unauthorised access, viruses, corruption of data)

be deliberate, natural, accidental, perceived

cause loss of goodwill, reputation or credibility

cause loss, disclosure, destruction or compromise of asset

cause risk of litigation.

Theoperating environmentof an organisation may relate to:

competitors

core business functions

environmental issues

financial markets

key stakeholders

market share

nature of operations

neighbours

scale of operations

situational issues

size of company

stability of company, organisation, industry and market

type of industry

workforce.

Causes and sourcesof threats may include:

a group of people

a nation, country or state

an individual

an organisation

natural events or the environment.

Assessment criteriamay be based on:

organisational or client requirements

qualitative factors

quantitative factors

semi-quantitative factors

the Australian Standard AS/NZS 4360:1999 Risk Management (or its equivalent).

Consequencesmay include:

consideration of effect on client's ability to continue core functions

disruption to operations

impact on neighbours and subsequent litigation

loss of asset (eg property, lives, reputation, goodwill)

loss of privacy

loss of service or business

loss of trust

loss or reduction of productivity.

Factorsmay include:

changes to the operational environment such as neighbours, financial markets and market share

those with regard to repair or replacement of assets and activities such as time, cost, training and availability.

Threat impactevaluation may relate to:

factors related to the repair or replacement of assets and activities

level of seriousness

risk of litigation.

Contingencyarrangements may relate to:

cessation of operations

continuity of operations

partial closure

transfer of operations.

Reportsmay include:

graphical representations of data

recommendations

summary of assessment outcomes

tables and information from approved data collection tools.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Applicable provisions of legislative and organisational requirements, and relevant standards for threat assessment activities are identified and complied with. 
Client operations, goals and objectives are discussed and confirmed in consultation with relevant persons. 
Relevant information is gathered from reliable sources and verified for accuracy. 
A review is conducted of organisational assets and existing security arrangements to determine the range of potential or actual undesirable outcomes by following criteria in relevant standards. 
Additional information is sourced as required from reliable and verifiable information sources. 
Context for identifying threats is based on an accurate understanding of the threats to operational environments and core business operations of the client. 
Potential causes and sources of potential or existing threats are identified based on an evaluation of gathered information and data. 
Information gaps are identified and additional information is collected from appropriate sources to ensure all potentially relevant information is included in the process. 
Assessment criteria for measuring level of potential or actual threat is developed in accordance with client terms of reference, relevant standards and organisational procedures. 
Likelihood and realisation of threat is assessed against identified client information and data and organised in a format suitable for analysis and interpretation. 
Threats to operational environments are systematically monitored to assess performance systems and processes with specific consideration given to changing roles, locations, and stability of operating environment. 
Assessment criteria is agreed with relevant persons and used as a basis for measuring consequence analysis. 
Assets and activities are assessed for criticality to client operations against consideration of all factors which impact on the operating environment including threat impact using agreed assessment criteria. 
Reliability, availability and capacity of operational back-up systems for assets and activities are assessed in terms of the impact to normal operations. 
Potential consequences of threats are confirmed through consultation with relevant persons and analysis of all relevant information. 
Client contingency requirements are identified and arranged based on an assessment of all factors. 
A report outlining assessment findings is prepared in the required format, style and structure and presented to the client within specified time, budget and quality constraints. 
Information is valid and relevant and analysis and recommendations are clear, justified and consistent with client terms of reference and organisational requirements. 
Feedback on client satisfaction with service delivery is sought and all queries are responded to promptly, courteously. 
Client satisfaction with service delivery is collected and reviewed using verifiable data. 
All information and material is securely retained and stored with due regard to client confidentiality requirements. 

Forms

Assessment Cover Sheet

CPPSEC4007A - Assess threat
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

CPPSEC4007A - Assess threat

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: