Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
literacy and communication skills to:
present information
report incidents where assets are threatened
problem-solving skills to:
anticipate and respond to threats to information assets
solve known problems in routine procedures
technical skills to:
install and activate system filtering and security settings
operate a computer and software application
protect and secure information assets
provide first-level response.
Required knowledge
information assets and key sources of information assets
types of security options available to secure assets
assets supported by the organisation
general ICT hardware
organisation’s security procedures.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Information assets may include: | equipment files forms online or printed data and information passkeys or passwords procedures programs or information channels reports. |
Organisation may include: | departments entities outside the business government individuals inside and outside the business the whole business. |
Affect may include: | confidentiality financial personal privacy issues reputation. |
Loss or damage may include: | alteration damage or destruction deletion misuse theft unauthorised publication. |
Secure may include: | appropriate modification of procedures or processes changing of passwords or work habits physical exclusion or control protective software installation or operation. |
Appropriate person may include: | business owner or authorised business representative client government peers police as appropriate supervisor. |
First-level response may include: | changing passwords excluding people from access locking doors locking down the workplace logging off powering down systems updating software protection. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist