NTISthis.com

Evidence Guide: DEFCMM001 - Maintain security in a Defence communications and information systems environment

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

DEFCMM001 - Maintain security in a Defence communications and information systems environment

What evidence can you provide to prove your understanding of each of the following citeria?

Maintain physical security

  1. Maintain physical security to ensure the safeguarding of official matters.
  2. Report breaches of physical security to appropriate personnel.
Maintain physical security to ensure the safeguarding of official matters.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report breaches of physical security to appropriate personnel.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain communications security

  1. Protect classified and sensitive material as it is passed over communications paths.
  2. Handle classified and cryptographic material.
  3. Document and report security violations.
Protect classified and sensitive material as it is passed over communications paths.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Handle classified and cryptographic material.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document and report security violations.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain information system security

  1. Protect information systems media, assets and data.
  2. Record and report breaches of security.
Protect information systems media, assets and data.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record and report breaches of security.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain personnel security

  1. Apply personnel security principles to protect against the threat of subversion, sabotage and espionage.
  2. Record and report breaches of security.
Apply personnel security principles to protect against the threat of subversion, sabotage and espionage.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record and report breaches of security.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain physical security

  1. Maintain physical security to ensure the safeguarding of official matters
Maintain physical security to ensure the safeguarding of official matters

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report breaches of physical security to appropriate personnel

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain communications security

  1. Protect classified and sensitive material as it is passed over communications paths
Protect classified and sensitive material as it is passed over communications paths

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Handle classified and cryptographic material

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document and report security violations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain information system security

  1. Protect information systems media, assets and data
Protect information systems media, assets and data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record and report breaches of security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain personnel security

  1. Apply personnel security principles to protect against the threat of subversion, sabotage and espionage
Apply personnel security principles to protect against the threat of subversion, sabotage and espionage

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

Evidence required to demonstrate competence in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria on at least one occasion and includes:

applying circuit procedures

handling classified/COMSEC material

opening/closing combination/cipher locks

performing routine/field/emergency destruction procedures

performing publication amendments

maintaining physical security:

handle classified and sensitive material

control access to secure areas

follow checks and muster procedures

maintain logs and registers

follow destruction procedures

report breaches in accordance with approved guidelines and procedures

maintaining communications security:

handle classified and sensitive material

maintain circuit discipline

employ electronic protection methods

maintaining information systems security:

follow information systems security practices

account for media and assets

maintain data integrity

maintaining personnel security:

apply 'need to know' principle

be aware of own responsibilities

Evidence required to demonstrate competence in this unit must be relevant to and satisfy all of the requirements of the elements and performance criteria and include knowledge of:

circuit procedures

combination and cipher lock operation

cryptographic handling requirements

information systems security practices

publication amendment procedures

reporting and recording procedures

roles and responsibilities of team members

routine/field/emergency destruction procedures

rules pertaining to page by page mustering of publications

security requirements for classified material

special handling procedures

techniques for supporting others

Range Statement

Range is restricted to essential operating conditions and any other variables essential to the work environment.

Non-essential conditions may be found in the Companion Volume Implementation Guide.