Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

DEFCMM001 Mapping and Delivery Guide
Maintain security in a Defence communications and information systems environment

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency DEFCMM001 - Maintain security in a Defence communications and information systems environment
Description
Employability Skills
Learning Outcomes and Application This unit involves the skills and knowledge required to Maintain security in a Defence communications and information systems environment.It includes the skills required to maintain personnel, physical, communications and information systems security within the Defence communications and information systems workplace.This unit applies to communications and information systems operators working within Defence but may be relevant to others who work in this field.The skills and knowledge described in this unit must be applied within the legislative, regulatory and policy environment in which they are carried out. Organisational policies and procedures must be consulted and adhered to.Those undertaking this unit would work independently and as part of a team, under direct and/or indirect supervision within specific communications environments. They would use discretion and judgement, and take responsibility for the quality of their outputs while performing specific tasks in a range of sometimes unpredictable contexts.No licensing, legislative or certification requirements apply to unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Assessors must hold credentials specified within the Standards for Registered Training Organisations current at the time of assessment.

Assessment must satisfy the Principles of Assessment and Rules of Evidence and all regulatory requirements included within the Standards for Registered Training Organisations current at the time of assessment.

Assessment must occur in workplace operational situations. Where this is not appropriate, assessment must occur in simulated workplace operational situations that reflect workplace conditions.

Assessment processes and techniques must be appropriate to the language, literacy and numeracy requirements of the work being performed and the needs of the candidate.

Resources for assessment must include access to:

a range of relevant exercises, case studies and/or simulations

acceptable means of simulation assessment

applicable documentation, including workplace procedures, regulations, codes of practice and operation manuals

relevant materials, tools, equipment and PPE currently used in industry.

Prerequisites/co-requisites
Competency Field Communications
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Maintain physical security
  • Maintain physical security to ensure the safeguarding of official matters.
  • Report breaches of physical security to appropriate personnel.
       
Element: Maintain communications security
  • Protect classified and sensitive material as it is passed over communications paths.
  • Handle classified and cryptographic material.
  • Document and report security violations.
       
Element: Maintain information system security
  • Protect information systems media, assets and data.
  • Record and report breaches of security.
       
Element: Maintain personnel security
  • Apply personnel security principles to protect against the threat of subversion, sabotage and espionage.
  • Record and report breaches of security.
       
Element: Maintain physical security
  • Maintain physical security to ensure the safeguarding of official matters
       
Element: Report breaches of physical security to appropriate personnel
       
Element: Maintain communications security
  • Protect classified and sensitive material as it is passed over communications paths
       
Element: Handle classified and cryptographic material
       
Element: Document and report security violations
       
Element: Maintain information system security
  • Protect information systems media, assets and data
       
Element: Record and report breaches of security
       
Element: Maintain personnel security
  • Apply personnel security principles to protect against the threat of subversion, sabotage and espionage
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

Evidence required to demonstrate competence in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria on at least one occasion and includes:

applying circuit procedures

handling classified/COMSEC material

opening/closing combination/cipher locks

performing routine/field/emergency destruction procedures

performing publication amendments

maintaining physical security:

handle classified and sensitive material

control access to secure areas

follow checks and muster procedures

maintain logs and registers

follow destruction procedures

report breaches in accordance with approved guidelines and procedures

maintaining communications security:

handle classified and sensitive material

maintain circuit discipline

employ electronic protection methods

maintaining information systems security:

follow information systems security practices

account for media and assets

maintain data integrity

maintaining personnel security:

apply 'need to know' principle

be aware of own responsibilities

Evidence required to demonstrate competence in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria and include knowledge of:

circuit procedures

combination and cipher lock operation

cryptographic handling requirements

information systems security practices

publication amendment procedures

reporting and recording procedures

roles and responsibilities of team members

routine/field/emergency destruction procedures

rules pertaining to page by page mustering of publications

security requirements for classified material

special handling procedures

techniques for supporting others


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Range is restricted to essential operating conditions and any other variables essential to the work environment.

Non-essential conditions may be found in the Companion Volume Implementation Guide.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Maintain physical security to ensure the safeguarding of official matters. 
Report breaches of physical security to appropriate personnel. 
Protect classified and sensitive material as it is passed over communications paths. 
Handle classified and cryptographic material. 
Document and report security violations. 
Protect information systems media, assets and data. 
Record and report breaches of security. 
Apply personnel security principles to protect against the threat of subversion, sabotage and espionage. 
Record and report breaches of security. 
Maintain physical security to ensure the safeguarding of official matters 
 
Protect classified and sensitive material as it is passed over communications paths 
 
 
Protect information systems media, assets and data 
 
Apply personnel security principles to protect against the threat of subversion, sabotage and espionage 

Forms

Assessment Cover Sheet

DEFCMM001 - Maintain security in a Defence communications and information systems environment
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

DEFCMM001 - Maintain security in a Defence communications and information systems environment

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: