Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
analytical skills to undertake risk assessment of data-gathering techniques
communication skills to manage group facilitation and presentation related to transferring and collecting information
literacy skills to produce business reports
planning and organisational skills to provide accurate and concise insights to possible security threats for all levels of staff, both technical and managerial
problem-solving skills to identify and remedy evolving and complex security threat scenarios.
Required knowledge
detailed knowledge of:
communications security, including human organisational interactions
how to conduct an information security risk assessment
internet technology security, including firewalls
physical security
security testing methods for performing security tests
wireless security
overview knowledge of:
current industry-accepted security processes, including general features and capabilities of software and hardware solutions
ethics in IT
general features of specific security technology
privacy issues and legislation
process security for policy and procedures.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Requirements may relate to: | business network people in the organisation system. |
Security threats may include: | by-pass actions data tampering and manipulation eavesdropping impersonation keyboard logging local applications or local area network (LAN) connections penetration weaknesses in internet networks. |
Security policy may relate to: | audits and alerts privacy standards, including: archival backup network theft viruses. |
Security plan may include: | logical controls physical controls social controls. |
Security strategy: | may include: authentication authorisation and integrity privacy usually forms part of the overall objectives of the organisation. |
Stakeholders may include: | development team project team sponsor user. |
Organisational guidelines may include: | communication methods content of emails dispute resolution document procedures downloading information and accessing particular websites financial control mechanisms opening mail with attachments personal use of emails and internet access templates virus risk. |
Risk assessment may include: | developing risk plans developing scenarios evaluating threats following up gathering information identifying counter measures identifying threats ranking risk reporting. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist