Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Research IT security requirements
  2. Conduct risk analysis
  3. Develop IT security policy and operational procedures

Required Skills

Required skills

Researching skills related to security

Ability to articulate complex security scenarios in a clear concise manner relevant to all levels of the organisation

Skills in relation to analysis evaluation and presentation of information

Group facilitation and presentation skills in relation to transferring and collecting information

Required knowledge

Current industryaccepted hardware and software products including broad knowledge of security features and capabilities

Accurate and indepth knowledge of the client business domain

Broad general knowledge of privacy issues and legislation egwhen integrating legal requirements with IT security

Risk analysis relating to IT security including broad knowledge of general security issues incorporating substantial depth in some areas

Detailed knowledge of operating systems including strengths and weaknesses over lifetime of product

Awareness of legislation relating to IT security

Evidence Required

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria required skills and knowledge range statement and the Assessment Guidelines for the Training Package

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the following is essential

Assessment must confirm sufficient knowledge of the basic elements of legal obligations with respect to privacy and the specific application of security issues

Assessment must confirm the ability to incorporate common security products and procedures into a security design

To demonstrate competency in this unit the following resources will be needed

IT business specifications

Information on the security environment including relevant lawslegislation existing organisational security policies organisational expertise and knowledge

Possible security environment also includes the threats to security that are or are held to be present in the environment

Risk analysis toolsmethodologies

IT security assurance specifications

Context of and specific resources for assessment

The breadth depth and complexity involving analysis design planning execution and evaluation across a range of technical andor management functions including development of new criteria or applications or knowledge or procedures would be characteristic

Developing an IT security framework requires depth and complexity involving analysis diagnosis design planning execution and evaluation across a broad range of technical functions including development of new criteria or applications or knowledge or procedures

Significant analysis of ISOIECAS and other relevant standards is considered essential as a benchmark for establishing and maintaining a security framework

Significant contribution to the development of security polices procedures and framework is involved

Assessment must ensure

application of a significant range of fundamental principles and complex techniques across a wise and often unpredictable variety of contexts in relation to either varied or highly specific functions Contribution to the development of a broad plan budget or strategy may be involved and accountability and responsibility for self and others in achieving the outcomes may also be characteristic

Applications involve significant judgement in planning design technical or leadershipguidance functions related to products services operations or procedures would be common

Method of assessment

The purpose of this unit is to define the standard of performance to be achieved in the workplace In undertaking training and assessment activities related to this unit consideration should be given to the implementation of appropriate diversity and accessibility practices in order to accommodate people who may have special needs Additional guidance on these and related matters is provided in ICA Section

The purpose of this unit is to define the standard of performance to be achieved in the workplace. In undertaking training and assessment activities related to this unit, consideration should be given to the implementation of appropriate diversity and accessibility practices in order to accommodate people who may have special needs. Additional guidance on these and related matters is provided in ICA05 Section 1.

Competency in this unit should to be assessed using summative assessment to ensure consistency of performance in a range of contexts This unit can be assessed either in the workplace or in a simulated environment However simulated activities must closely reflect the workplace to enable full demonstration of competency

Assessment will usually include observation of real or simulated work processes and procedures andor performance in a project context as well as questioning on underpinning knowledge and skills The questioning of team members supervisors subordinates peers and clients where appropriate may provide valuable input to the assessment process The interdependence of units for assessment purposes may vary with the particular project or scenario

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector workplace and job role is recommended for example

ICAAB Design system security and controls

ICAA6053B Design system security and controls

An individual demonstrating this competency would be able to

Demonstrate clear understanding of security relationships between software hardware and human interaction

Analyse security solutions and implement objective solutions across a broad range criteria

Produce security design solutions through the analysis of information and concepts at an abstract level

Demonstrate understanding of specialised knowledge with depth in some areas

Analyse diagnose design and execute judgement across a broad range of technical or management functions

Generate ideas through the analysis of information and concepts at an abstract level

Demonstrate a command of wideranging highly specialised technical creative or conceptual skills

Demonstrate accountability for personal outputs within broad parameters

Demonstrate accountability for personal and group outcomes within broad parameters


Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Security requirements

May include laws, organisational security policies, customs, expertise and knowledge. The security environment also includes the threats to security that are, or are held to be, present in the environment, encryption, passwords, hardware, authentication and policies

Security threats may include but are not limited to:

weaknesses in internet networks

local applications or LAN connections

keyboard logging

eavesdropping

data tampering and manipulation; impersonation, penetration and by-pass actions

Client may include but are not limited to:

internal departments

external organisations

individual people

employees

Security policies

To cover theft, viruses, standards (including archival, back-up, network), privacy, audits and alerts. Usually relates directly to the security objectives of the organisation

Security strategy includes:

privacy

authentication

authorisation and integrity

usually relates directly to the security objectives of the organisation

User may include:

a person within a department

a department within the organisation

a third party

Appropriate person may include:

supervisor

teacher

authorised business representative

client