ICTSAS418
Monitor and administer security of an ICT system


Application

This unit describes the skills and knowledge required to monitor and administer security functions of an information and communications technology (ICT) system.

It applies to experienced individuals who, while working under a level of supervision, have responsibility in a frontline technical support capacity to ensure organisational standards are met, and apply technical and specialised knowledge to maintain the security of a system.

No licensing, legislative, or certification requirements apply to this unit at the time of publication.


Elements and Performance Criteria

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Ensure user accounts are controlled

1.1 Modify default user settings to ensure they conform to security policy

1.2 Modify previously created user settings to ensure they conform to updated security policy

1.3 Ensure legal notices displayed at logon are appropriate

1.4 Check strength of passwords using the appropriate utilities and consider tightening rules for password complexity

1.5 Take action to ensure password procedures are reviewed with appropriate other internal departments

1.6 Monitor email to uncover breaches in compliance with legislation

1.7 Access information services to identify security gaps and take appropriate action using hardware and software or patches

2. Secure file and resource access

2.1 Review inbuilt security and access features of the operating system and consider need for further action

2.2 Develop or review the file security categorisation scheme, and develop an understanding of the role of users in setting security

2.3 Monitor and record security threats to the system

2.4 Implement a virus checking process and schedule for the server, computer and other system components

2.5 Investigate and implement inbuilt or additional encryption facilities

3. Monitor threats to the network

3.1 Use third-party software or utilities to evaluate and report on system security

3.2 Review logs and audit reports to identify security threats

3.3 Carry out spot checks and other security strategies to ensure that procedures are being followed

3.4 Prepare and present an audit report and recommendations to appropriate person

3.5 Obtain approval for recommended changes to be made

Evidence of Performance

Evidence of the ability to:

review user accounts for their security control

identify security features available in the operating environment

monitor, document and administer security functions on the system

monitor threats to the network using:

third-party diagnostic tools

implementation of virus checking process and schedule

preparation of an audit report and recommendations.

Note: Evidence must be provided for at least TWO systems or occasions.


Evidence of Knowledge

To complete the unit requirements safely and effectively, the individual must:

describe the key features of current industry accepted hardware and software products related to IT security

discuss privacy issues and legislation with regard to IT security

explain the key components of risk analysis process for system security

describe the key features of specific security technology and systems technologies

analyse the client business domain, including client organisation structure and business functionality.


Assessment Conditions

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the systems administration and support field of work and include access to:

special purpose tools, equipment and materials

industry software packages

the security policy

industry and organisational standards

a live system.

Assessors must satisfy NVR/AQTF assessor requirements.


Foundation Skills

This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.

Skill

Performance Criteria

Description

Reading

1.3, 1.6, 1.7, 2.1, 2.2, 2.5, 3.1, 3.5

Researches and analyses technical and non-technical information and system data from a range of sources to determine requirements and complete necessary actions

Writing

1.5, 2.2, 2.3, 3.1, 3.4

Accurately records information and system data using required format, terminology and conventions specific to requirements

Prepares reports using concise language and correct spelling and grammar to convey explicit information, requirements and recommendations

Oral Communication

1.5, 3.1, 3.5

Obtains information by listening and questioning, and participates in verbal exchanges with a range of personnel using detailed and clear language to contribute information and express requirements and recommendations

Numeracy

1.1, 1.2, 2.3-2.5, 3.1, 3.2

Uses mathematical equations to calculate and compare system and numerical data to determine required actions and prepare reports and schedules

Interact with others

1.5, 3.4, 3.5

Selects and uses appropriate conventions and protocols when communicating with others in a range of work contexts

Get the work done

1.1-1.7, 2.1-2.5, 3.1-3.4

Takes responsibility for planning, sequencing and prioritising tasks and own workload for efficiency and effective outcomes

Applies analytical processes to resolve technical or conceptual problems

Uses main features and functions of digital tools to complete work tasks


Sectors

Systems administration and support