Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

PSPSEC011 Mapping and Delivery Guide
Assess security risks

Version 1.0
Issue Date: September 2018


Qualification -
Unit of Competency PSPSEC011 - Assess security risks
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills required to assess government security risks. It includes establishing the risk context, gathering and analysing information and identifying, analysing, assessing and prioritising risks.This unit applies to those working to develop a security plan or implementing or following an existing plan.The skills and knowledge described in this unit must be applied within the legislative, regulatory and policy environment in which they are carried out. Organisational policies and procedures must be consulted and adhered to, particularly those related to assessing security risks.Those undertaking this unit would work independently, initiating support from a range of established and new resources while performing complex tasks in a range of unfamiliar and unfamiliar contexts.No licensing, legislative or certification requirements apply to unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Assessment of this unit requires evidence gathered over time in a workplace environment or one that closely resembles normal work practice and replicates the diverse conditions likely to be encountered when assessing security risks

Assessors must satisfy the NVR/AQTF mandatory competency requirements for assessors.

Prerequisites/co-requisites
Competency Field Security
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Establish security risk context
  • Identify the scope and strategic and organisational contexts of the risk assessment.
  • Identify and comply with legislation, policies, procedures and guidelines related to security risk management.
  • Identify stakeholders and their expectations and obtain their input.
  • Identify security risk criteria.
  • Develop and obtain endorsement for a risk assessment plan according to organisational priorities.
       
Element: Gather and analyse information
  • Identify sources and gather information.
  • Review relevant internal and historical information.
  • Aggregate and contextualise new information from internal and external sources.
  • Identify and address information gaps.
       
Element: Identify security risks
  • Determine sources of threat to the organisation’s resources and functions.
  • Conduct threat assessment against organisational policies, procedures and guidelines and determine risk exposure.
  • Use risk assessment techniques which suit the type and level of risk.
  • Determine and document risk potential.
       
Element: Analyse security risks
  • Analyse potential consequences of risks or threats in light of potential damage to agency, including critical lead time for recovery.
  • Assess intent, capability and opportunity for each risk or threat to occur, using all available information.
  • Analyse current security countermeasures and treatment options to determine areas of vulnerability.
  • Determine and document risk ratings in agreed format.
       
Element: Assess and prioritise security risks
  • Consult stakeholders regarding acceptable and unacceptable risk levels.
  • Document acceptable and unacceptable levels of risk.
  • Compare identified risks with security risk criteria to determine whether they are acceptable or unacceptable.
  • Prioritise and document identified risks in accordance with security criteria.
  • Document determined residual risks.
       
Element: Establish security risk context
  • Identify the scope and strategic and organisational contexts of the risk assessment.
  • Identify and comply with legislation, policies, procedures and guidelines related to security risk management.
  • Identify stakeholders and their expectations and obtain their input.
  • Identify security risk criteria.
  • Develop and obtain endorsement for a risk assessment plan according to organisational priorities.
       
Element: Gather and analyse information
  • Identify sources and gather information.
  • Review relevant internal and historical information.
  • Aggregate and contextualise new information from internal and external sources.
  • Identify and address information gaps.
       
Element: Identify security risks
  • Determine sources of threat to the organisation’s resources and functions.
  • Conduct threat assessment against organisational policies, procedures and guidelines and determine risk exposure.
  • Use risk assessment techniques which suit the type and level of risk.
  • Determine and document risk potential.
       
Element: Analyse security risks
  • Analyse potential consequences of risks or threats in light of potential damage to agency, including critical lead time for recovery.
  • Assess intent, capability and opportunity for each risk or threat to occur, using all available information.
  • Analyse current security countermeasures and treatment options to determine areas of vulnerability.
  • Determine and document risk ratings in agreed format.
       
Element: Assess and prioritise security risks
  • Consult stakeholders regarding acceptable and unacceptable risk levels.
  • Document acceptable and unacceptable levels of risk.
  • Compare identified risks with security risk criteria to determine whether they are acceptable or unacceptable.
  • Prioritise and document identified risks in accordance with security criteria.
  • Document determined residual risks.
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Establish security risk context

1.1 Identify the scope and strategic and organisational contexts of the risk assessment.

1.2 Identify and comply with legislation, policies, procedures and guidelines related to security risk management.

1.3 Identify stakeholders and their expectations and obtain their input.

1.4 Identify security risk criteria.

1.5 Develop and obtain endorsement for a risk assessment plan according to organisational priorities.

2. Gather and analyse information

2.1 Identify sources and gather information.

2.2 Review relevant internal and historical information.

2.3 Aggregate and contextualise new information from internal and external sources.

2.4 Identify and address information gaps.

3. Identify security risks

3.1 Determine sources of threat to the organisation’s resources and functions.

3.2 Conduct threat assessment against organisational policies, procedures and guidelines and determine risk exposure.

3.3 Use risk assessment techniques which suit the type and level of risk.

3.4 Determine and document risk potential.

4. Analyse security risks

4.1 Analyse potential consequences of risks or threats in light of potential damage to agency, including critical lead time for recovery.

4.2 Assess intent, capability and opportunity for each risk or threat to occur, using all available information.

4.3 Analyse current security countermeasures and treatment options to determine areas of vulnerability.

4.4 Determine and document risk ratings in agreed format.

5. Assess and prioritise security risks

5.1 Consult stakeholders regarding acceptable and unacceptable risk levels.

5.2 Document acceptable and unacceptable levels of risk.

5.3 Compare identified risks with security risk criteria to determine whether they are acceptable or unacceptable.

5.4 Prioritise and document identified risks in accordance with security criteria.

5.5 Document determined residual risks.

Evidence required to demonstrate competence must satisfy all of the requirements of the elements and performance criteria. If not otherwise specified the candidate must demonstrate evidence of performance of the following on at least two occasions.

applying legislation, regulations and policies relating to security risk management

undertaking risk assessment

reading and analysing the complex information in standards and security plans

researching and analysing the operational environment and drawing accurate conclusions

applying critical analysis, evaluation and deductive reasoning

using problem solving and creative thinking in decision making

communicating with diverse stakeholders: interviewing, listening, questioning, paraphrasing, clarifying, summarising

writing reports requiring formal language and structure

using computer technology and modelling to gather and analyse information and prepare reports

representing numerical, graphical and statistical information in diverse formats

Operational knowledge of:

public service Acts

Crimes Act 1914 and Criminal Code 1985

Freedom of Information Act 1982

Privacy Act 1988

fraud control policy

protective security policy

Australian Government Information Security Manual (ISM)

Protective Security Policy Framework

Australian standards, quality assurance and certification requirements

Complex knowledge of:

risk assessment techniques/processes

information handling

qualitative and quantitative analysis techniques

incident reports and statistics

asset holdings and recording mechanisms

international treaties and protocols

cross-jurisdictional protocols

organisation’s strategic objectives

national strategic objectives

requirements of user groups


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes

Performance criteria describe the performance needed to demonstrate achievement of the element. Where bold italicised text is used, further information is detailed in the range of conditions section.

1. Establish security risk context

1.1 Identify the scope and strategic and organisational contexts of the risk assessment.

1.2 Identify and comply with legislation, policies, procedures and guidelines related to security risk management.

1.3 Identify stakeholders and their expectations and obtain their input.

1.4 Identify security risk criteria.

1.5 Develop and obtain endorsement for a risk assessment plan according to organisational priorities.

2. Gather and analyse information

2.1 Identify sources and gather information.

2.2 Review relevant internal and historical information.

2.3 Aggregate and contextualise new information from internal and external sources.

2.4 Identify and address information gaps.

3. Identify security risks

3.1 Determine sources of threat to the organisation’s resources and functions.

3.2 Conduct threat assessment against organisational policies, procedures and guidelines and determine risk exposure.

3.3 Use risk assessment techniques which suit the type and level of risk.

3.4 Determine and document risk potential.

4. Analyse security risks

4.1 Analyse potential consequences of risks or threats in light of potential damage to agency, including critical lead time for recovery.

4.2 Assess intent, capability and opportunity for each risk or threat to occur, using all available information.

4.3 Analyse current security countermeasures and treatment options to determine areas of vulnerability.

4.4 Determine and document risk ratings in agreed format.

5. Assess and prioritise security risks

5.1 Consult stakeholders regarding acceptable and unacceptable risk levels.

5.2 Document acceptable and unacceptable levels of risk.

5.3 Compare identified risks with security risk criteria to determine whether they are acceptable or unacceptable.

5.4 Prioritise and document identified risks in accordance with security criteria.

5.5 Document determined residual risks.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Identify the scope and strategic and organisational contexts of the risk assessment. 
Identify and comply with legislation, policies, procedures and guidelines related to security risk management. 
Identify stakeholders and their expectations and obtain their input. 
Identify security risk criteria. 
Develop and obtain endorsement for a risk assessment plan according to organisational priorities. 
Identify sources and gather information. 
Review relevant internal and historical information. 
Aggregate and contextualise new information from internal and external sources. 
Identify and address information gaps. 
Determine sources of threat to the organisation’s resources and functions. 
Conduct threat assessment against organisational policies, procedures and guidelines and determine risk exposure. 
Use risk assessment techniques which suit the type and level of risk. 
Determine and document risk potential. 
Analyse potential consequences of risks or threats in light of potential damage to agency, including critical lead time for recovery. 
Assess intent, capability and opportunity for each risk or threat to occur, using all available information. 
Analyse current security countermeasures and treatment options to determine areas of vulnerability. 
Determine and document risk ratings in agreed format. 
Consult stakeholders regarding acceptable and unacceptable risk levels. 
Document acceptable and unacceptable levels of risk. 
Compare identified risks with security risk criteria to determine whether they are acceptable or unacceptable. 
Prioritise and document identified risks in accordance with security criteria. 
Document determined residual risks. 
Identify the scope and strategic and organisational contexts of the risk assessment. 
Identify and comply with legislation, policies, procedures and guidelines related to security risk management. 
Identify stakeholders and their expectations and obtain their input. 
Identify security risk criteria. 
Develop and obtain endorsement for a risk assessment plan according to organisational priorities. 
Identify sources and gather information. 
Review relevant internal and historical information. 
Aggregate and contextualise new information from internal and external sources. 
Identify and address information gaps. 
Determine sources of threat to the organisation’s resources and functions. 
Conduct threat assessment against organisational policies, procedures and guidelines and determine risk exposure. 
Use risk assessment techniques which suit the type and level of risk. 
Determine and document risk potential. 
Analyse potential consequences of risks or threats in light of potential damage to agency, including critical lead time for recovery. 
Assess intent, capability and opportunity for each risk or threat to occur, using all available information. 
Analyse current security countermeasures and treatment options to determine areas of vulnerability. 
Determine and document risk ratings in agreed format. 
Consult stakeholders regarding acceptable and unacceptable risk levels. 
Document acceptable and unacceptable levels of risk. 
Compare identified risks with security risk criteria to determine whether they are acceptable or unacceptable. 
Prioritise and document identified risks in accordance with security criteria. 
Document determined residual risks. 

Forms

Assessment Cover Sheet

PSPSEC011 - Assess security risks
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

PSPSEC011 - Assess security risks

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: