NTISthis.com

Evidence Guide: CPPSEC3035A - Identify technical security requirements

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

CPPSEC3035A - Identify technical security requirements

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to identify security requirements.

  1. Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.
  2. Assignment instructions are obtained, reviewed and clarified as required with relevant persons.
  3. Consultative processes are conducted to establish the scope and immediate, short and long term security requirements of the client.
  4. Appropriate communication and interpersonal techniques are used which reflect sensitivity to individual social and cultural differences.
  5. Specialist resources and sources of information are accessed and assessed as required.
  6. Limitations in determining client needs are recognised and specialist advice is sought as required.
Applicable provisions of legislative and organisational requirements relevant to assignment instructions are identified and complied with.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assignment instructions are obtained, reviewed and clarified as required with relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consultative processes are conducted to establish the scope and immediate, short and long term security requirements of the client.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Appropriate communication and interpersonal techniques are used which reflect sensitivity to individual social and cultural differences.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Specialist resources and sources of information are accessed and assessed as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Limitations in determining client needs are recognised and specialist advice is sought as required.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify security requirements.

  1. Site access and specific site requirements are identified and appropriate arrangements made in accordance with organisational procedures.
  2. Relevant information appropriate to assignment instructions is gathered from reliable sources in accordance with organisational procedures.
  3. A site assessment is conducted and documented in accordance with organisational procedures.
  4. Site security risk factors are identified and assessed in accordance with organisational procedures.
Site access and specific site requirements are identified and appropriate arrangements made in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Relevant information appropriate to assignment instructions is gathered from reliable sources in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

A site assessment is conducted and documented in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Site security risk factors are identified and assessed in accordance with organisational procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document security requirements.

  1. Business equipmentand technology is used to prepare and present information in required format and style.
  2. An assessment of client security requirements is completed within designated timeframes and presented for review to relevant persons.
  3. Assessment contains comprehensive information about available security equipment, systems and services to meet identified security requirements.
  4. Recommendations and alternative options are prioritised and supported by verifiable evidence.
  5. Information is securely maintained with due regard to client confidentiality.
Business equipmentand technology is used to prepare and present information in required format and style.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

An assessment of client security requirements is completed within designated timeframes and presented for review to relevant persons.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessment contains comprehensive information about available security equipment, systems and services to meet identified security requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommendations and alternative options are prioritised and supported by verifiable evidence.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information is securely maintained with due regard to client confidentiality.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Critical aspects for assessment and evidence required to demonstrate competency in this unit

A person who demonstrates competency in this unit must be able to provide evidence of:

identifying applicable legislative requirements which will impact on security assessment and accurately completing all documentation

preparing a summary of assessed client needs and prioritising security recommendations in a format suitable for review

sourcing and gathering relevant information and conducting a comprehensive site assessment to identify client assets, activities and existing security arrangements

using appropriate methods to determine suitable technical security requirements and options to meet client needs and expectations

using appropriate security assessment methods to determine client security requirements.

Context of and specific resources for assessment

Context of assessment includes:

a setting in the workplace or environment that simulates the conditions of performance described in the elements, performance criteria and range statement.

Resource implications for assessment include:

access to plain English version of relevant statutes and procedures

access to a registered provider of assessment services

access to a suitable venue and equipment

assessment instruments including personal planner and assessment record book

work schedules, organisational policies and duty statements.

Reasonable adjustments must be made to assessment processes where required for people with disabilities. This could include access to modified equipment and other physical resources, and the provision of appropriate assessment support.

Method of assessment

This unit of competency could be assessed using the following methods of assessment:

observation of processes and procedures

questioning of underpinning knowledge and skills.

Guidance information for assessment

Assessment processes and techniques must be culturally appropriate and suitable to the language, literacy and numeracy capacity of the candidate and the competency being assessed. In all cases where practical assessment is used, it should be combined with targeted questioning to assess the underpinning knowledge.

Oral questioning or written assessment may be used to assess underpinning knowledge. In assessment situations where the candidate is offered a choice between oral questioning and written assessment, questions are to be identical.

Supplementary evidence may be obtained from relevant authenticated correspondence from existing supervisors, team leaders or specialist training staff.

Required Skills and Knowledge

This section describes the skills and knowledge and their level required for this unit.

Required skills

apply active listening

apply basic numeracy techniques

apply safe and efficient work practices

assess existing site security systems

communicate in a clear and concise manner

comply with relevant legislative and regulatory requirements including licensing

determine site technical security requirements

enter data using basic keyboarding skills

identify potential security threats to people, property and premises

organise work tasks in a methodical manner

prepare and present reports

present a professional image to members of the public and colleagues

prioritise tasks and complete work within designated timeframes

read and interpret plans, designs and specifications

relate to people from different social and cultural backgrounds.

Required knowledge

basic problem solving strategies

building construction methods and types

duty of care

legislative and organisational policies and procedures including licensing requirements

operational principles of business equipment and information technology

organisational and client confidentiality requirements

principles of effective communication

procedures to assess security systems including security manpower

relevant industry standards and codes of conduct

reporting procedures and documentation requirements and processes

security risk assessment methods

types and functions of technical security equipment, systems and services.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Legislative requirementsmay relate to:

applicable commonwealth, state and territory legislation which affects work such as:

workplace safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity

Australian building codes and regulations

Australian Communications Authority cabling standards

Australian standards and quality assurance requirements

award and enterprise agreements

evidence collection

freedom of information

licensing arrangements and certification requirements

privacy requirements

relevant industry codes of practice

telecommunications

trade practices.

Organisational requirements may relate to:

access and equity policies, principles and practices

business and performance plans

client service standards

code of conduct, code of ethics

communication and reporting procedures

complaint and dispute resolution procedures

emergency and evacuation procedures

employer and employee rights and responsibilities

Occupational Health and Safety (OHS) policies, procedures and programs

own role, responsibility and authority

personal and professional development

privacy and confidentiality of information

quality assurance and continuous improvement processes and standards

resource parameters and procedures

roles, functions and responsibilities of security personnel

storage and disposal of information.

Assignment instructionsmay include:

access to site, security clearance and specific site requirements

budget constraints

equipment requirements:

business equipment

communication equipment

reporting and documentation requirements

specific client requirements

timeframes

work schedules and completion dates

work tasks and procedures.

Relevant personsmay include:

clients

colleagues

engineers and technicians

equipment and systems manufacturers

security consultants

security personnel

site managers or project managers

supervisor.

Scopemay relate to:

conformance with insurance requirements

legislative, regulatory or industry requirements

protection of persons, property or assets.

Clientmay be:

building supervisor

government authorities

manager

project manager

property agent

property owner

tenant.

Interpersonal techniques may involve:

active listening

being non-judgemental

being respectful and non-discriminatory

constructive feedback

control of tone of voice and body language

culturally aware and sensitive use of language and concepts

demonstrating flexibility and willingness to negotiate

effective verbal and non-verbal communication

maintaining professionalism

providing sufficient time for questions and responses

reflection and summarising

two-way interaction

use of plain English

use of positive, confident and cooperative language.

Social and cultural differencesmay relate to:

dress and personal presentation

food

language

religion

social conventions

traditional practices

values and beliefs.

Site access and specific site requirementsmay relate to:

access and egress points

access codes, keys or passes

building codes and regulations

heritage requirements

noise control

obtaining security clearance

OHS requirements

time of access to site

union requirements.

Relevant informationmay include:

areas requiring a higher level of security

business and operational plans

core business activities and functions

current and proposed operating environments, assets and systems

current management strategies

existing security systems and equipment

insurance policies

security incident history.

Site assessmentmay involve identifying:

access and egress patterns

existing security equipment and systems

floor plan

site restrictions and regulations

type and condition of building structures.

Assessmentdocumentationmay include:

checklists

client briefs

existing security equipment and systems

floor plans

recommendations

specifications

written and electronic reports.

Security risks factorsmay relate to:

adequacy of street lighting

break-in

burglary

client habits eg doors left unlocked

deliberate or accidental damage

entry points screened from public view

external doors without deadlocks or with hinges opening outward

neighbourhood crime rating

pilferage

proximity of other buildings

sabotage

theft

threats of loss, harm or damage to persons or property

traffic flow

trespass

unauthorised access

unsecured windows and doors

vandalism.

Business equipment and technology may include:

calculators

facsimile machines

internet

personal schedulers

photocopiers

printers

standard commercial computer software and hardware

telephones.