The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Undertake background assessment.
|
|
Applicable provisions of legislative and organisational requirements, and relevant standards for threat assessment activities are identified and complied with. Completed |
Evidence:
|
Client operations, goals and objectives are discussed and confirmed in consultation with relevant persons. Completed |
Evidence:
|
Relevant information is gathered from reliable sources and verified for accuracy. Completed |
Evidence:
|
A review is conducted of organisational assets and existing security arrangements to determine the range of potential or actual undesirable outcomes by following criteria in relevant standards. Completed |
Evidence:
|
Additional information is sourced as required from reliable and verifiable information sources. Completed |
Evidence:
|
Identify and analyse potential or existing threats.
|
|
Context for identifying threats is based on an accurate understanding of the threats to operational environments and core business operations of the client. Completed |
Evidence:
|
Potential causes and sources of potential or existing threats are identified based on an evaluation of gathered information and data. Completed |
Evidence:
|
Information gaps are identified and additional information is collected from appropriate sources to ensure all potentially relevant information is included in the process. Completed |
Evidence:
|
Assessment criteria for measuring level of potential or actual threat is developed in accordance with client terms of reference, relevant standards and organisational procedures. Completed |
Evidence:
|
Likelihood and realisation of threat is assessed against identified client information and data and organised in a format suitable for analysis and interpretation. Completed |
Evidence:
|
Threats to operational environments are systematically monitored to assess performance systems and processes with specific consideration given to changing roles, locations, and stability of operating environment. Completed |
Evidence:
|
Undertake consequence analysis.
|
|
Assessment criteria is agreed with relevant persons and used as a basis for measuring consequence analysis. Completed |
Evidence:
|
Assets and activities are assessed for criticality to client operations against consideration of all factors which impact on the operating environment including threat impact using agreed assessment criteria. Completed |
Evidence:
|
Reliability, availability and capacity of operational back-up systems for assets and activities are assessed in terms of the impact to normal operations. Completed |
Evidence:
|
Potential consequences of threats are confirmed through consultation with relevant persons and analysis of all relevant information. Completed |
Evidence:
|
Client contingency requirements are identified and arranged based on an assessment of all factors. Completed |
Evidence:
|
Review and present findings.
|
|
A report outlining assessment findings is prepared in the required format, style and structure and presented to the client within specified time, budget and quality constraints. Completed |
Evidence:
|
Information is valid and relevant and analysis and recommendations are clear, justified and consistent with client terms of reference and organisational requirements. Completed |
Evidence:
|
Feedback on client satisfaction with service delivery is sought and all queries are responded to promptly, courteously. Completed |
Evidence:
|
Client satisfaction with service delivery is collected and reviewed using verifiable data. Completed |
Evidence:
|
All information and material is securely retained and stored with due regard to client confidentiality requirements. Completed |
Evidence:
|