NTISthis.com

Evidence Guide: ICTSAS207 - Protect and secure information assets

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTSAS207 - Protect and secure information assets

What evidence can you provide to prove your understanding of each of the following citeria?

Identify assets and threats

  1. Identify types of information assets in the organisation
  2. Identify mechanisms by which information assets are accessed, transmitted and stored
  3. Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation
Identify types of information assets in the organisation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify mechanisms by which information assets are accessed, transmitted and stored

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure assets

  1. Identify actions, mechanisms and strategies to protect information assets
  2. Secure assets within scope of authority
  3. Report issues to appropriate person and other issues where they are outside scope of authority
Identify actions, mechanisms and strategies to protect information assets

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure assets within scope of authority

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report issues to appropriate person and other issues where they are outside scope of authority

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Mitigate or prevent damage to assets

  1. Identify signs and evidence that information assets are threatened or undergoing loss or damage
  2. Provide first level response to reduce effects, mitigate damage and protect evidence
  3. Report incident, effects and actions to appropriate person
Identify signs and evidence that information assets are threatened or undergoing loss or damage

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Provide first level response to reduce effects, mitigate damage and protect evidence

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report incident, effects and actions to appropriate person

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Identify assets and threats

1.1 Identify types of information assets in the organisation

1.2 Identify mechanisms by which information assets are accessed, transmitted and stored

1.3 Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation

2. Secure assets

2.1 Identify actions, mechanisms and strategies to protect information assets

2.2 Secure assets within scope of authority

2.3 Report issues to appropriate person and other issues where they are outside scope of authority

3. Mitigate or prevent damage to assets

3.1 Identify signs and evidence that information assets are threatened or undergoing loss or damage

3.2 Provide first level response to reduce effects, mitigate damage and protect evidence

3.3 Report incident, effects and actions to appropriate person

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Identify assets and threats

1.1 Identify types of information assets in the organisation

1.2 Identify mechanisms by which information assets are accessed, transmitted and stored

1.3 Establish nature of threats to information assets and determine effect that loss or damage may have to the organisation

2. Secure assets

2.1 Identify actions, mechanisms and strategies to protect information assets

2.2 Secure assets within scope of authority

2.3 Report issues to appropriate person and other issues where they are outside scope of authority

3. Mitigate or prevent damage to assets

3.1 Identify signs and evidence that information assets are threatened or undergoing loss or damage

3.2 Provide first level response to reduce effects, mitigate damage and protect evidence

3.3 Report incident, effects and actions to appropriate person

Evidence of the ability to:

identify the organisation's information assets and the ways in which these assets are used

establish potential threats to information assets and analyse the effects these threats would have on the organisation

implement measures to secure assets, and mitigate or prevent damage, according to organisational requirements

discuss details of security threats and issues relating to information assets with appropriate persons

report issues or incidents according to organisational requirements.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

identify information assets and key sources of information assets

identify the types of security responses available to secure assets

identify assets supported by the organisation

describe general information and communications technology (ICT) hardware and security implications

identify the organisation’s security procedures.