Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

PRSTS301A Mapping and Delivery Guide
Identify technical security requirements

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency PRSTS301A - Identify technical security requirements
Description This competency standard covers the skills and knowledge required to determine technical security requirements for small domestic or commercial environments. It requires the ability to source relevant information and use appropriate assessment methods to accurately determine security equipment/system options to meet client needs. This work would be carried out under routine supervision within organisational guidelines.Functional Area: Core, Technical SecurityThis competency standard covers the skills and knowledge required to determine technical security requirements for small domestic or commercial environments. It requires the ability to source relevant information and use appropriate assessment methods to accurately determine security equipment/system options to meet client needs. This work would be carried out under routine supervision within organisational guidelines.Functional Area: Core, Technical Security
Employability Skills Not applicable.
Learning Outcomes and Application Not applicable.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.
Prerequisites/co-requisites Not applicable.
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Prepare to identify security requirements
  • Assignment instructions are reviewed and clarified with appropriate person(s) as required in accordance with organisational requirements
  • Discussions with client are conducted to establish perceived security risks and clarify scope of security requirements
  • Specific site requirements are identified and appropriate arrangements made as required in accordance with client and organisational requirements
  • Personal limitations in assessing security requirements are promptly identified and assistance is sought from appropriate person(s) in accordance with organisational procedures
       
Element: Identify security requirements
  • Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements
  • Information is gathered from reliable sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements
  • A site assessment is carried out where possible to facilitate an accurate determination of security system requirements
  • Security risk factors that may affect the site are identified and assessed in accordance with organisational procedures
       
Element: Document security requirements
  • Business equipment is used to manage information efficiently and effectively in accordance with manufacturers specifications and organisational procedures
  • An assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s)
  • Assessment report uses clear and concise language, is free of inconsistencies and meets organisational standards of style, format and accuracy
  • Recommendations for security equipment / systems and alternative options are supported by gathered and verifiable information in accordance with organisational requirements
  • Documentation requirements are completed and processed in accordance with legislative, assignment and organisational requirements
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The Evidence Guide identifies the requirements to be demonstrated to confirm competence for this unit. Assessment must confirm sufficient ability to use appropriate skills and knowledge to assess technical security requirements for clients. Assessment of performance should be over a period of time covering all categories within the Range of Variables statements that are applicable in the learning environment.

What critical aspects are required for evidence of competency?

Source and gather relevant information and conduct a comprehensive site assessment to identify client assets, activities and existing security arrangements.

Use appropriate research methods to determine suitable technical security requirements and options to meet client needs and expectations.

Prepare a summary of assessed client needs and recommended security options in a format suitable for review.

What specific knowledge is needed to achieve the performance criteria?

Knowledge and understanding are essential to apply this standard in the workplace, to transfer the skills to other contexts and to deal with unplanned events. The knowledge requirements for this competency standard are listed below:

available security equipment/system options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes.

What specific skills are needed to achieve the performance criteria?

To achieve the performance criteria, some specific skills are required. These include the ability to:

recognise security threats to people, property and premises

observe and assess technical security requirements

read and interpret plans, designs and specifications

apply basic numeracy techniques

apply safe and efficient work practices

communicate in a clear and concise manner

relate to people from different social and cultural backgrounds

present a professional image

prepare and present reports

organise work tasks in a methodical manner

enter data using basic keyboarding skills.

What resources may be required for assessment?

Access to a suitable venue and equipment.

Access to plain English version of relevant statutes and procedures.

Assignment instructions, work plans and schedules, policy documents and duty statements.

Assessment instruments, including personal planner and assessment record book.

Access to a registered provider of assessment services.

What is required to achieve consistency of performance?

For valid and reliable assessment of this unit, the competency should be demonstrated over a period of time and observed by the assessor. The competency is to be demonstrated in a range of situations, which may include involvement in related activities normally experienced in the workplace.

Evidence of underpinning knowledge understanding of processes and principles can be gained through thorough questioning and by observation of previous work.

Assessment against this unit may involve the following:

Continuous assessment in a setting that simulates the conditions of performance described in the elements, performance criteria and range of variables statement that make up the unit.

Continuous assessment in the workplace, taking into account the range of variables affecting performance.

Self-assessment on the same terms as those described above.

Simulated assessment or critical incident assessment, provided that the critical incident involves assessment against performance criteria and an evaluation of underpinning knowledge and skill required to achieve the required performance outcomes.

Key competency levels

There are a number of processes that are learnt throughout work and life which are required in all jobs. They are fundamental processes and generally transferable to other work functions. Some of these are covered by the key competencies, although others may be added.

Information below highlights how these processes are applied in this competency standard.

1 - perform the process

2 - perform and administer the process

3 - perform, administer and design the process

How can communication of ideas and information be applied? (2)

Discussions may be conducted with relevant persons to clarify scope of client technical security requirements.

How can information be collected, analysed and organised? (2)

A site assessment may be carried out, accurately documented and organised by records or reports.

How are activities planned and organised? (2)

Site assessments may be arranged with minimal disruption to client, services or normal work routines.

How can team work be applied? (2)

Clarification may be sought from relevant persons to ensure a clear understanding of assignment requirements.

How can the use of mathematical ideas and techniques be applied? (2)

Mathematical techniques may be used to estimate resource and equipment/system requirements. It may also be used to plan and schedule work tasks.

How can problem solving skills be applied? (2)

Personal limitations in assessing technical security requirements may be promptly identified and appropriate assistance sought.

How can the use of technology be applied? (2)

Technology may be used to communicate, schedule, source and document information.

The Evidence Guide identifies the requirements to be demonstrated to confirm competence for this unit. Assessment must confirm sufficient ability to use appropriate skills and knowledge to assess technical security requirements for clients. Assessment of performance should be over a period of time covering all categories within the Range of Variables statements that are applicable in the learning environment.

What critical aspects are required for evidence of competency?

Source and gather relevant information and conduct a comprehensive site assessment to identify client assets, activities and existing security arrangements.

Use appropriate research methods to determine suitable technical security requirements and options to meet client needs and expectations.

Prepare a summary of assessed client needs and recommended security options in a format suitable for review.

What specific knowledge is needed to achieve the performance criteria?

Knowledge and understanding are essential to apply this standard in the workplace, to transfer the skills to other contexts and to deal with unplanned events. The knowledge requirements for this competency standard are listed below:

available security equipment/system options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes.

What specific skills are needed to achieve the performance criteria?

To achieve the performance criteria, some specific skills are required. These include the ability to:

recognise security threats to people, property and premises

observe and assess technical security requirements

read and interpret plans, designs and specifications

apply basic numeracy techniques

apply safe and efficient work practices

communicate in a clear and concise manner

relate to people from different social and cultural backgrounds

present a professional image

prepare and present reports

organise work tasks in a methodical manner

enter data using basic keyboarding skills.

What resources may be required for assessment?

Access to a suitable venue and equipment.

Access to plain English version of relevant statutes and procedures.

Assignment instructions, work plans and schedules, policy documents and duty statements.

Assessment instruments, including personal planner and assessment record book.

Access to a registered provider of assessment services.

What is required to achieve consistency of performance?

For valid and reliable assessment of this unit, the competency should be demonstrated over a period of time and observed by the assessor. The competency is to be demonstrated in a range of situations, which may include involvement in related activities normally experienced in the workplace.

Evidence of underpinning knowledge understanding of processes and principles can be gained through thorough questioning and by observation of previous work.

Assessment against this unit may involve the following:

Continuous assessment in a setting that simulates the conditions of performance described in the elements, performance criteria and range of variables statement that make up the unit.

Continuous assessment in the workplace, taking into account the range of variables affecting performance.

Self-assessment on the same terms as those described above.

Simulated assessment or critical incident assessment, provided that the critical incident involves assessment against performance criteria and an evaluation of underpinning knowledge and skill required to achieve the required performance outcomes.

Key competency levels

There are a number of processes that are learnt throughout work and life which are required in all jobs. They are fundamental processes and generally transferable to other work functions. Some of these are covered by the key competencies, although others may be added.

Information below highlights how these processes are applied in this competency standard.

1 - perform the process

2 - perform and administer the process

3 - perform, administer and design the process

How can communication of ideas and information be applied? (2)

Discussions may be conducted with relevant persons to clarify scope of client technical security requirements.

How can information be collected, analysed and organised? (2)

A site assessment may be carried out, accurately documented and organised by records or reports.

How are activities planned and organised? (2)

Site assessments may be arranged with minimal disruption to client, services or normal work routines.

How can team work be applied? (2)

Clarification may be sought from relevant persons to ensure a clear understanding of assignment requirements.

How can the use of mathematical ideas and techniques be applied? (2)

Mathematical techniques may be used to estimate resource and equipment/system requirements. It may also be used to plan and schedule work tasks.

How can problem solving skills be applied? (2)

Personal limitations in assessing technical security requirements may be promptly identified and appropriate assistance sought.

How can the use of technology be applied? (2)

Technology may be used to communicate, schedule, source and document information.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

Not applicable.

The Range of Variables provides information about the context in which the unit of competency is carried out. It allows for different work practices and work and knowledge requirements as well as for differences between organisations and workplaces. The following variables may be present for this particular unit:

Assignment instructions may include:

instructions from supervisor/management

work schedules and completion dates

specific client requirements

site requirements, security clearance and access requirements

reporting and documentation requirements

budget allocations.

Appropriate person(s) may include:

clients

site managers

project managers

engineers and technicians

technical experts

line managers/supervisors

colleagues

regulatory personnel

security consultants.

Organisational requirements may relate to:

legal and organisational operational policies and procedures

operations manuals, induction and training materials

insurance policy agreements

client and organisational confidentiality requirements

organisational goals, objectives, plans, systems and processes

employer and employee rights and responsibilities

own role, responsibility and delegation

quality and continuous improvement processes and standards

client service standards

defined resource parameters

OHS policies, procedures and programs

emergency and evacuation procedures

duty of care, code of conduct, code of ethics

access and equity policy, principles and practice

records and information systems and processes

communication channels and reporting procedures.

Client may include:

owner

property agent

tenant

building supervisor

manager

project manager

agent

government and legal instruments/agencies.

Scope may include:

protection of persons, property or assets

conformance with insurance

government or other requirements.

Site access and specific site requirements may relate to:

access and egress points, time of access

access codes, keys, passes, security clearances

union requirements

OHS requirements

building codes and regulations

heritage listings

noise control.

Assessment may involve

discussions with client

visual inspections

review of client floor plans and supporting documentation

questioning police, insurance companies and other bodies.

Applicable legislation, codes and national standards may relate to:

relevant Commonwealth/State/Territory legislation which affect organisational operation:

Occupational Health and Safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity.

licensing arrangements

Australian Standards, quality assurance and certification requirements

relevant industry Codes of Practice

trade practices, award and enterprise agreements

privacy related legislation.

Information may include:

insurance policy agreements

special rooms or areas requiring higher level of protection

current/proposed operating environments, assets and systems

activities and functions

existing security systems/equipment

existing management strategies

business and operational plans

incident history.

Site assessment may involve:

type and condition of building structures

site restrictions, regulations and requirements

access and egress patterns

floor plan

existing security equipment/systems.

Security risks factors may include:

vandalism, trespass, break-in, burglary

unsecured windows

entry points screened from public view

external doors without deadlocks or with hinges opening outward

flimsy building materials

client habits (e.g. doors left unlocked)

adequacy of street lighting

traffic flow

neighbourhood crime rating

proximity of other buildings.

Business equipment may include:

computers, computer applications, modems

personal schedulers

e-mail, internet/intranet

facsimile machines

printers

photocopiers

scanners.

Security equipment and systems may include:

detection devices, audible/visual warning devices

cameras, monitors and control equipment

control panels, intercoms

wireless equipment, car alarms

electronic readers, electronic recognition controls

locks and locking systems

grills, lighting, boom gates, turnstiles

bank pop-up screens

smoke detection devices

electric/mechanical fire safety and fire locking systems

power supplies, batteries

security doors and door controls.

Security systems may be:

electronic

mechanical

computerised

procedural.

Documentation may include:

checklists

reports

floor plans

client briefs

specifications

schedules.

The Range of Variables provides information about the context in which the unit of competency is carried out. It allows for different work practices and work and knowledge requirements as well as for differences between organisations and workplaces. The following variables may be present for this particular unit:

Assignment instructions may include:

instructions from supervisor/management

work schedules and completion dates

specific client requirements

site requirements, security clearance and access requirements

reporting and documentation requirements

budget allocations.

Appropriate person(s) may include:

clients

site managers

project managers

engineers and technicians

technical experts

line managers/supervisors

colleagues

regulatory personnel

security consultants.

Organisational requirements may relate to:

legal and organisational operational policies and procedures

operations manuals, induction and training materials

insurance policy agreements

client and organisational confidentiality requirements

organisational goals, objectives, plans, systems and processes

employer and employee rights and responsibilities

own role, responsibility and delegation

quality and continuous improvement processes and standards

client service standards

defined resource parameters

OHS policies, procedures and programs

emergency and evacuation procedures

duty of care, code of conduct, code of ethics

access and equity policy, principles and practice

records and information systems and processes

communication channels and reporting procedures.

Client may include:

owner

property agent

tenant

building supervisor

manager

project manager

agent

government and legal instruments/agencies.

Scope may include:

protection of persons, property or assets

conformance with insurance

government or other requirements.

Site access and specific site requirements may relate to:

access and egress points, time of access

access codes, keys, passes, security clearances

union requirements

OHS requirements

building codes and regulations

heritage listings

noise control.

Assessment may involve

discussions with client

visual inspections

review of client floor plans and supporting documentation

questioning police, insurance companies and other bodies.

Applicable legislation, codes and national standards may relate to:

relevant Commonwealth/State/Territory legislation which affect organisational operation:

Occupational Health and Safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity.

licensing arrangements

Australian Standards, quality assurance and certification requirements

relevant industry Codes of Practice

trade practices, award and enterprise agreements

privacy related legislation.

Information may include:

insurance policy agreements

special rooms or areas requiring higher level of protection

current/proposed operating environments, assets and systems

activities and functions

existing security systems/equipment

existing management strategies

business and operational plans

incident history.

Site assessment may involve:

type and condition of building structures

site restrictions, regulations and requirements

access and egress patterns

floor plan

existing security equipment/systems.

Security risks factors may include:

vandalism, trespass, break-in, burglary

unsecured windows

entry points screened from public view

external doors without deadlocks or with hinges opening outward

flimsy building materials

client habits (e.g. doors left unlocked)

adequacy of street lighting

traffic flow

neighbourhood crime rating

proximity of other buildings.

Business equipment may include:

computers, computer applications, modems

personal schedulers

e-mail, internet/intranet

facsimile machines

printers

photocopiers

scanners.

Security equipment and systems may include:

detection devices, audible/visual warning devices

cameras, monitors and control equipment

control panels, intercoms

wireless equipment, car alarms

electronic readers, electronic recognition controls

locks and locking systems

grills, lighting, boom gates, turnstiles

bank pop-up screens

smoke detection devices

electric/mechanical fire safety and fire locking systems

power supplies, batteries

security doors and door controls.

Security systems may be:

electronic

mechanical

computerised

procedural.

Documentation may include:

checklists

reports

floor plans

client briefs

specifications

schedules.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Assignment instructions are reviewed and clarified with appropriate person(s) as required in accordance with organisational requirements 
Discussions with client are conducted to establish perceived security risks and clarify scope of security requirements 
Specific site requirements are identified and appropriate arrangements made as required in accordance with client and organisational requirements 
Personal limitations in assessing security requirements are promptly identified and assistance is sought from appropriate person(s) in accordance with organisational procedures 
Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements 
Information is gathered from reliable sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements 
A site assessment is carried out where possible to facilitate an accurate determination of security system requirements 
Security risk factors that may affect the site are identified and assessed in accordance with organisational procedures 
Business equipment is used to manage information efficiently and effectively in accordance with manufacturers specifications and organisational procedures 
An assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s) 
Assessment report uses clear and concise language, is free of inconsistencies and meets organisational standards of style, format and accuracy 
Recommendations for security equipment / systems and alternative options are supported by gathered and verifiable information in accordance with organisational requirements 
Documentation requirements are completed and processed in accordance with legislative, assignment and organisational requirements 

Forms

Assessment Cover Sheet

PRSTS301A - Identify technical security requirements
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

PRSTS301A - Identify technical security requirements

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: