ICTWEB408
Ensure basic website security


Application

This unit describes the skills and knowledge required to provide basic website server, and protocol security appropriate to the level required by an organisation.

It applies to individuals employed as web maintenance staff who are required to ensure that a website meets basic security requirements.

No licensing, legislative or certification requirements apply to this unit at the time of publication.


Elements and Performance Criteria

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Determine business security requirements

1.1 Identify the level of security required based on the business, and the commercial intent of the website

1.2 Identify whether password protection is needed for the site, or part of the site

1.3 Decide on minimum or maximum password protection solutions, based on the business requirements

2. Ensure web server security

2.1 Ensure that the web server password is obscure and non-traceable

2.2 Install and maintain an effective intrusion detection system, according to business requirements

2.3 Ensure that user accounts have only the required permissions on the server

2.4 Ensure that interpreters’ programs, that run common gateway interfaces (CGIs), are not stored in the CGI-bin directory

2.5 Ensure that web forms check data before passing it to the server

3. Ensure protocol security

3.1 Protect the fixed internet connection, and the internet protocol (IP) address

3.2 Protect shared network resources from intrusion, according to business requirements

3.3 Ensure that personal computer (PC) protocols and preferences follow security protocols

3.4 Disable control protocol, or internet protocol (TCP/IP), bindings for file and printer sharing

3.5 Ensure that network basic input/output system (NetBIOS) over TCP/IP is disabled

Evidence of Performance

Evidence of the ability to:

identify the level of security required by the business for the website

implement password protection solutions, for the website and the server

install and maintain, an intrusion detection system

implement protocol security.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.


Evidence of Knowledge

To complete the unit requirements safely and effectively, the individual must:

outline the client business domain, including the client organisation structure and business functionality

identify current industry-accepted hardware and software products

outline desktop applications and operating systems, as required

describe firewall functionality

describe hypertext transfer protocol (HTTP) and disk and executing monitor tools (daemons)

outline the range of security protocols, including:

secure socket layer (SSL)

point-to-point network tunnelling protocol (PPTP)

layer 2 tunnelling protocol (L2TP)

define security patches

explain specific purpose security computers, acting as bastion hosts

explain web-server operating systems.


Assessment Conditions

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances should be typical of those experienced in the website technologies field of work, and include access to:

special purpose tools, equipment, materials

industry software packages

a basic website and web servers

the organisational requirements documentation

website manuals and instructions.

Assessors must satisfy NVR/AQTF assessor requirements.


Foundation Skills

This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.

Skill

Performance Criteria

Description

Reading

1.1-1.3, 2.1-2.5, 3.1-3.5

Identify and evaluate technical information to produce solutions to business requirements

Identify critical information and cross check for accuracy

Writing

2.2, 3.1-3.5

Writes and edits, computer code and technical data, ensuring the correct syntax and accuracy

Oral Communication

1.1, 1.2

Listens and asks questions to elicit information

Navigate the world of work

1.3

Ensures the compliance of the product against the business requirements and protocols

Get the work done

1.1-1.3, 2.1-2.5, 3.1-3.5

Plans approach to work based on the analysis of business needs and requirements

Sequences, schedules and prioritises own work activities

Resolves issues and implements tests, to ascertain the functionality of solutions prior to full implementation

Utilises a combination of lateral and analytical thinking, to evaluate and validate reliability, and the efficacy of the website

Uses a range of digitally-based technologies, and the software packages and hardware, required for interrogating vendor databases and websites


Sectors

Web