|
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included. |
User may include: | a person within a departmenta department within the organisationa third party |
Security policy may be in relation to: | theftvirusesstandards (including archival, back-up, network)privacyaudits and alerts, usually relates directly to the security objectives of the organisation |
Legislation may include: | privacy legislationcopyrightliability statements |
Hardware may include but is not limited to: | workstationspersonal computersmodems or other connectivity devicesnetworksDSL modemsremote sitesservers |
Software may include but is not limited to: | commercial, in-house, packaged or customised software |
Appropriateperson may include: | supervisorteacherauthorised business representativeclient |
Operating system may include but is not limited to: | Linux 6.0 or aboveWindows 98 or aboveApple OS 8 or above |
Server may include: | Application/web serversBEA Weblogic serversIBM VisualAge and WebSphereNovell NDS serversEmail serversFile and print serversFTP serversFirewall serversProxy/cache servers |
System may include but is not limited to: | hardware and software components that run a computer |
Computer may include: | laptopsworkstationsserversother devices |
Encryption may include: | features or protocols such as RSA public keyPGP (pretty good privacy)symmetric ciphersasymmetric public-key cipherssniffersPKISSHDesloginPKZIPsecure socket layer (SSL)digital signatures |
Security threats may include: | eavesdroppingmanipulationimpersonationpenetrationdenial of serviceby-passhackingviruses |
Securitystrategies may include: | privacyauthenticationauthorisation and integrityusually relates directly to the security objectives of the organisation |