Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
analytical skills to evaluate system security
communication skills to communicate clear concepts and solutions to complex issues
literacy skills to write reports
planning skills to:
develop a security plan
develop a security recovery plan
problem-solving skills to:
manage unpredictable problems involving participation in group solutions and analysis
resolve issues for a mixed mode environment of people and systems processes
research skills to identify, analyse and evaluate weaknesses and strengths of security systems
technical skills to use systems security methodologies and technologies.
Required knowledge
broad knowledge of general features of specific security technology
risk analysis techniques, with broad knowledge of their general features, and depth in security procedures
details of the client organisation
systems management and process control in relation to security
systems technologies, with broad knowledge of their general features and capabilities.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
System may include: | application service provider applications databases gateways internet service provider (ISP) operating system servers wireless network access policies using mobile devices. |
Threats may include: | denial of service and by-pass eavesdropping hackers impersonation manipulation penetration viruses. |
Security plan may include: | alerts relating directly to the security objectives of the organisation audits privacy standards: archival backup network theft viruses. |
Security may include: | AAA Diameter IPSec LEAP PKM smart cards SSL tokens WEP WPA. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist