Assessor Resource

DEFCO401C
Maintain security in a Defence communications and information systems environment

Assessment tool

Version 1.0
Issue Date: April 2024


This unit was developed for communications and information systems operators working within Defence but is applicable to any individual in this field of work.

The maintenance of personnel, physical, communications and information systems security are a fundamental requirement of communications and information systems operators.

Typically operators work independently and as part of a team under direct and/or indirect supervision, use discretion and judgement, and take responsibility for the quality of their outputs. All activities are carried out in accordance with relevant organisational policies and procedures.

This unit covers the competency required to maintain personnel, physical, communications and information systems security within the Defence communications and information systems workplace.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)

Prerequisites

Not applicable.


Employability Skills

This unit contains employability skills.




Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The evidence guide provides advice on assessment and must be read in conjunction with the Performance Criteria, Required Skills and Knowledge, the Range Statement and the Assessment Guidelines for this Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Assessment must confirm the ability to:

Physical security:

correctly handle classified and sensitive material

control access to secure areas

follow checks and muster procedures

correctly maintain logs and registers

follow destruction procedures

report breaches in accordance with approved guidelines and procedures.

Communications security:

correctly handle classified and sensitive material

maintain circuit discipline

employ electronic protection methods

Information systems security:

follow information systems security practices

account for media and assets

maintain data integrity

Personnel security:

apply need to know principle

be aware of own responsibilities

Consistency in performance

Competency should be demonstrated over time to ensure the individual is assessed across a wide variety of situations within the workplace.

Context of and specific resources for assessment

Context of assessment

Competency should be assessed in the workplace or in a simulated workplace environment.

Specific resources for assessment

Access is required to:

security reference material and documentation

destruction procedures/orders

Standard Operating Procedures


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

This describes the essential skills and knowledge and their level, required for this unit.

Required Skills

apply circuit procedures

correctly handle classified/COMSEC material

encourage other team members

follow directives

muster publications page by page

open/close combination/cipher locks

perform routine/field/emergency destruction procedures

participate in a team

perform publication amendments

provide timely and accurate reports

Required Knowledge

circuit procedures

combination and cipher lock operation

cryptographic handling requirements

information systems security practices

publication amendment procedures

reporting and recording procedures

roles and responsibilities of team members

routine/field/emergency destruction procedures

rules pertaining to page by page mustering of publications

security requirements for classified material

special handling procedures

techniques for supporting others

The Range Statement relates to the Unit of Competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording in the Performance Criteria is detailed below.

Physical security may include:

Checks and musters

Controlling of access

Destruction procedures

Maintenance of logs and registers

Reporting of breaches

Security of areas and containers

Security of documents, classified material and equipment

Defence security guidelines may include:

Communications publications

Communications security publications

Defence security publications

Information systems publications

National and allied publications

Communications paths may include:

Electronic

Radio

Verbal

Visual

Procedures may include:

Allied procedures

National procedures

Service specific procedures

Workplace specific procedures

Protecting information systems may include:

Accountability of computer assets

Application of information systems security and practices

Control of computer software

Integrity of data

Security of networks

Reporting and recording procedures may include:

Accurately reporting any violation of security, by means of:

verbal reports

written reports

combination of verbal and written reports

Maintaining logs and registers

Reading and interpreting relevant guidelines and procedures

Personnel security principles may include:

Individual awareness of responsibilities

Need to know principle

Security clearance requirements

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Physical security is maintained to ensure the safeguarding of official matter in accordance with specific workplace and Defence security guidelines. 
Breaches of physical security are reported to appropriate personnel. 
Classified and sensitive material is protected as it is passed over communications paths by the correct use of Defence communications security procedures and guidelines. 
Classified and cryptographic material is handled in accordance with specific workplace and Defence guidelines. 
Security violations are documented and reported to appropriate personnel. 
Information systems media, assets and data are protected in accordance with specific workplace and Defence information systems security guidelines. 
Breaches of security are recorded and reported to appropriate personnel. 
Personnel security principles are applied to protect against the threat of subversion, sabotage and espionage. 
Breaches of security are recorded and reported to appropriate personnel. 

Forms

Assessment Cover Sheet

DEFCO401C - Maintain security in a Defence communications and information systems environment
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

DEFCO401C - Maintain security in a Defence communications and information systems environment

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: