Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

ICTSAS207 Mapping and Delivery Guide
Protect and secure information assets

Version 1.0
Issue Date: May 2024


Qualification -
Unit of Competency ICTSAS207 - Protect and secure information assets
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills and knowledge required to ensure information assets are protected from improper access and appropriate actions are taken to secure assets in the event that they are threatened.It applies to individuals who, while working under a level of supervision, have responsibility in a frontline technical support capacity to exercise in a small or large office environment.No licensing, legislative or certification requirements apply to this unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:

a site with computer hardware and office environments representing a range of workplaces

appropriate software systems

organisational information assets

technical records, documentation and enterprise procedures.

Assessors must satisfy NVR/AQTF assessor requirements.

Prerequisites/co-requisites
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Identify assets and threats
  • Identify types of information assets in the organisation
  • Identify mechanisms by which information assets are accessed, transmitted and stored
  • Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation
       
Element: Secure assets
  • Identify actions, mechanisms and strategies to protect information assets
  • Secure assets within scope of authority
  • Report issues to appropriate person and other issues where they are outside scope of authority
       
Element: Mitigate or prevent damage to assets
  • Identify signs and evidence that information assets are threatened or undergoing loss or damage
  • Provide first level response to reduce effects, mitigate damage and protect evidence
  • Report incident, effects and actions to appropriate person
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Identify assets and threats

1.1 Identify types of information assets in the organisation

1.2 Identify mechanisms by which information assets are accessed, transmitted and stored

1.3 Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation

2. Secure assets

2.1 Identify actions, mechanisms and strategies to protect information assets

2.2 Secure assets within scope of authority

2.3 Report issues to appropriate person and other issues where they are outside scope of authority

3. Mitigate or prevent damage to assets

3.1 Identify signs and evidence that information assets are threatened or undergoing loss or damage

3.2 Provide first level response to reduce effects, mitigate damage and protect evidence

3.3 Report incident, effects and actions to appropriate person

Evidence of the ability to:

identify the organisation's information assets and the ways in which these assets are used

establish potential threats to information assets and analyse the effects these threats would have on the organisation

implement measures to secure assets, and mitigate or prevent damage, according to organisational requirements

discuss details of security threats and issues relating to information assets with appropriate persons

report issues or incidents according to organisational requirements.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

identify information assets and key sources of information assets

identify the types of security responses available to secure assets

identify assets supported by the organisation

describe general information and communications technology (ICT) hardware and security implications

identify the organisation’s security procedures.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Identify assets and threats

1.1 Identify types of information assets in the organisation

1.2 Identify mechanisms by which information assets are accessed, transmitted and stored

1.3 Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation

2. Secure assets

2.1 Identify actions, mechanisms and strategies to protect information assets

2.2 Secure assets within scope of authority

2.3 Report issues to appropriate person and other issues where they are outside scope of authority

3. Mitigate or prevent damage to assets

3.1 Identify signs and evidence that information assets are threatened or undergoing loss or damage

3.2 Provide first level response to reduce effects, mitigate damage and protect evidence

3.3 Report incident, effects and actions to appropriate person

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Identify types of information assets in the organisation 
Identify mechanisms by which information assets are accessed, transmitted and stored 
Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation 
Identify actions, mechanisms and strategies to protect information assets 
Secure assets within scope of authority 
Report issues to appropriate person and other issues where they are outside scope of authority 
Identify signs and evidence that information assets are threatened or undergoing loss or damage 
Provide first level response to reduce effects, mitigate damage and protect evidence 
Report incident, effects and actions to appropriate person 

Forms

Assessment Cover Sheet

ICTSAS207 - Protect and secure information assets
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICTSAS207 - Protect and secure information assets

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: