NTISthis.com

Evidence Guide: PRSTS301A - Identify technical security requirements

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

PRSTS301A - Identify technical security requirements

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to identify security requirements

  1. Assignment instructions are reviewed and clarified with appropriate person(s) as required in accordance with organisational requirements
  2. Discussions with client are conducted to establish perceived security risks and clarify scope of security requirements
  3. Specific site requirements are identified and appropriate arrangements made as required in accordance with client and organisational requirements
  4. Personal limitations in assessing security requirements are promptly identified and assistance is sought from appropriate person(s) in accordance with organisational procedures
Assignment instructions are reviewed and clarified with appropriate person(s) as required in accordance with organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Discussions with client are conducted to establish perceived security risks and clarify scope of security requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Specific site requirements are identified and appropriate arrangements made as required in accordance with client and organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Personal limitations in assessing security requirements are promptly identified and assistance is sought from appropriate person(s) in accordance with organisational procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify security requirements

  1. Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements
  2. Information is gathered from reliable sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements
  3. A site assessment is carried out where possible to facilitate an accurate determination of security system requirements
  4. Security risk factors that may affect the site are identified and assessed in accordance with organisational procedures
Site restrictions, regulations and requirements are identified and complied with in accordance with legislative, client and organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information is gathered from reliable sources and is relevant to assignment requirements in accordance with legislative, client and organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

A site assessment is carried out where possible to facilitate an accurate determination of security system requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security risk factors that may affect the site are identified and assessed in accordance with organisational procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document security requirements

  1. Business equipment is used to manage information efficiently and effectively in accordance with manufacturers specifications and organisational procedures
  2. An assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s)
  3. Assessment report uses clear and concise language, is free of inconsistencies and meets organisational standards of style, format and accuracy
  4. Recommendations for security equipment / systems and alternative options are supported by gathered and verifiable information in accordance with organisational requirements
  5. Documentation requirements are completed and processed in accordance with legislative, assignment and organisational requirements
Business equipment is used to manage information efficiently and effectively in accordance with manufacturers specifications and organisational procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

An assessment of client security requirements is completed within designated timeframes and presented for review to appropriate person(s)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessment report uses clear and concise language, is free of inconsistencies and meets organisational standards of style, format and accuracy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Recommendations for security equipment / systems and alternative options are supported by gathered and verifiable information in accordance with organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Documentation requirements are completed and processed in accordance with legislative, assignment and organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The Evidence Guide identifies the requirements to be demonstrated to confirm competence for this unit. Assessment must confirm sufficient ability to use appropriate skills and knowledge to assess technical security requirements for clients. Assessment of performance should be over a period of time covering all categories within the Range of Variables statements that are applicable in the learning environment.

What critical aspects are required for evidence of competency?

Source and gather relevant information and conduct a comprehensive site assessment to identify client assets, activities and existing security arrangements.

Use appropriate research methods to determine suitable technical security requirements and options to meet client needs and expectations.

Prepare a summary of assessed client needs and recommended security options in a format suitable for review.

What specific knowledge is needed to achieve the performance criteria?

Knowledge and understanding are essential to apply this standard in the workplace, to transfer the skills to other contexts and to deal with unplanned events. The knowledge requirements for this competency standard are listed below:

available security equipment/system options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes.

What specific skills are needed to achieve the performance criteria?

To achieve the performance criteria, some specific skills are required. These include the ability to:

recognise security threats to people, property and premises

observe and assess technical security requirements

read and interpret plans, designs and specifications

apply basic numeracy techniques

apply safe and efficient work practices

communicate in a clear and concise manner

relate to people from different social and cultural backgrounds

present a professional image

prepare and present reports

organise work tasks in a methodical manner

enter data using basic keyboarding skills.

What resources may be required for assessment?

Access to a suitable venue and equipment.

Access to plain English version of relevant statutes and procedures.

Assignment instructions, work plans and schedules, policy documents and duty statements.

Assessment instruments, including personal planner and assessment record book.

Access to a registered provider of assessment services.

What is required to achieve consistency of performance?

For valid and reliable assessment of this unit, the competency should be demonstrated over a period of time and observed by the assessor. The competency is to be demonstrated in a range of situations, which may include involvement in related activities normally experienced in the workplace.

Evidence of underpinning knowledge understanding of processes and principles can be gained through thorough questioning and by observation of previous work.

Assessment against this unit may involve the following:

Continuous assessment in a setting that simulates the conditions of performance described in the elements, performance criteria and range of variables statement that make up the unit.

Continuous assessment in the workplace, taking into account the range of variables affecting performance.

Self-assessment on the same terms as those described above.

Simulated assessment or critical incident assessment, provided that the critical incident involves assessment against performance criteria and an evaluation of underpinning knowledge and skill required to achieve the required performance outcomes.

Key competency levels

There are a number of processes that are learnt throughout work and life which are required in all jobs. They are fundamental processes and generally transferable to other work functions. Some of these are covered by the key competencies, although others may be added.

Information below highlights how these processes are applied in this competency standard.

1 - perform the process

2 - perform and administer the process

3 - perform, administer and design the process

How can communication of ideas and information be applied? (2)

Discussions may be conducted with relevant persons to clarify scope of client technical security requirements.

How can information be collected, analysed and organised? (2)

A site assessment may be carried out, accurately documented and organised by records or reports.

How are activities planned and organised? (2)

Site assessments may be arranged with minimal disruption to client, services or normal work routines.

How can team work be applied? (2)

Clarification may be sought from relevant persons to ensure a clear understanding of assignment requirements.

How can the use of mathematical ideas and techniques be applied? (2)

Mathematical techniques may be used to estimate resource and equipment/system requirements. It may also be used to plan and schedule work tasks.

How can problem solving skills be applied? (2)

Personal limitations in assessing technical security requirements may be promptly identified and appropriate assistance sought.

How can the use of technology be applied? (2)

Technology may be used to communicate, schedule, source and document information.

The Evidence Guide identifies the requirements to be demonstrated to confirm competence for this unit. Assessment must confirm sufficient ability to use appropriate skills and knowledge to assess technical security requirements for clients. Assessment of performance should be over a period of time covering all categories within the Range of Variables statements that are applicable in the learning environment.

What critical aspects are required for evidence of competency?

Source and gather relevant information and conduct a comprehensive site assessment to identify client assets, activities and existing security arrangements.

Use appropriate research methods to determine suitable technical security requirements and options to meet client needs and expectations.

Prepare a summary of assessed client needs and recommended security options in a format suitable for review.

What specific knowledge is needed to achieve the performance criteria?

Knowledge and understanding are essential to apply this standard in the workplace, to transfer the skills to other contexts and to deal with unplanned events. The knowledge requirements for this competency standard are listed below:

available security equipment/system options and basic requirements for installation

types and functions of security equipment and systems

building construction methods and types

organisational and client confidentiality requirements

basic problem solving strategies

operational principles of information technology

principles of effective communication

documentation requirements and processes.

What specific skills are needed to achieve the performance criteria?

To achieve the performance criteria, some specific skills are required. These include the ability to:

recognise security threats to people, property and premises

observe and assess technical security requirements

read and interpret plans, designs and specifications

apply basic numeracy techniques

apply safe and efficient work practices

communicate in a clear and concise manner

relate to people from different social and cultural backgrounds

present a professional image

prepare and present reports

organise work tasks in a methodical manner

enter data using basic keyboarding skills.

What resources may be required for assessment?

Access to a suitable venue and equipment.

Access to plain English version of relevant statutes and procedures.

Assignment instructions, work plans and schedules, policy documents and duty statements.

Assessment instruments, including personal planner and assessment record book.

Access to a registered provider of assessment services.

What is required to achieve consistency of performance?

For valid and reliable assessment of this unit, the competency should be demonstrated over a period of time and observed by the assessor. The competency is to be demonstrated in a range of situations, which may include involvement in related activities normally experienced in the workplace.

Evidence of underpinning knowledge understanding of processes and principles can be gained through thorough questioning and by observation of previous work.

Assessment against this unit may involve the following:

Continuous assessment in a setting that simulates the conditions of performance described in the elements, performance criteria and range of variables statement that make up the unit.

Continuous assessment in the workplace, taking into account the range of variables affecting performance.

Self-assessment on the same terms as those described above.

Simulated assessment or critical incident assessment, provided that the critical incident involves assessment against performance criteria and an evaluation of underpinning knowledge and skill required to achieve the required performance outcomes.

Key competency levels

There are a number of processes that are learnt throughout work and life which are required in all jobs. They are fundamental processes and generally transferable to other work functions. Some of these are covered by the key competencies, although others may be added.

Information below highlights how these processes are applied in this competency standard.

1 - perform the process

2 - perform and administer the process

3 - perform, administer and design the process

How can communication of ideas and information be applied? (2)

Discussions may be conducted with relevant persons to clarify scope of client technical security requirements.

How can information be collected, analysed and organised? (2)

A site assessment may be carried out, accurately documented and organised by records or reports.

How are activities planned and organised? (2)

Site assessments may be arranged with minimal disruption to client, services or normal work routines.

How can team work be applied? (2)

Clarification may be sought from relevant persons to ensure a clear understanding of assignment requirements.

How can the use of mathematical ideas and techniques be applied? (2)

Mathematical techniques may be used to estimate resource and equipment/system requirements. It may also be used to plan and schedule work tasks.

How can problem solving skills be applied? (2)

Personal limitations in assessing technical security requirements may be promptly identified and appropriate assistance sought.

How can the use of technology be applied? (2)

Technology may be used to communicate, schedule, source and document information.

Required Skills and Knowledge

Not applicable.

Range Statement

The Range of Variables provides information about the context in which the unit of competency is carried out. It allows for different work practices and work and knowledge requirements as well as for differences between organisations and workplaces. The following variables may be present for this particular unit:

Assignment instructions may include:

instructions from supervisor/management

work schedules and completion dates

specific client requirements

site requirements, security clearance and access requirements

reporting and documentation requirements

budget allocations.

Appropriate person(s) may include:

clients

site managers

project managers

engineers and technicians

technical experts

line managers/supervisors

colleagues

regulatory personnel

security consultants.

Organisational requirements may relate to:

legal and organisational operational policies and procedures

operations manuals, induction and training materials

insurance policy agreements

client and organisational confidentiality requirements

organisational goals, objectives, plans, systems and processes

employer and employee rights and responsibilities

own role, responsibility and delegation

quality and continuous improvement processes and standards

client service standards

defined resource parameters

OHS policies, procedures and programs

emergency and evacuation procedures

duty of care, code of conduct, code of ethics

access and equity policy, principles and practice

records and information systems and processes

communication channels and reporting procedures.

Client may include:

owner

property agent

tenant

building supervisor

manager

project manager

agent

government and legal instruments/agencies.

Scope may include:

protection of persons, property or assets

conformance with insurance

government or other requirements.

Site access and specific site requirements may relate to:

access and egress points, time of access

access codes, keys, passes, security clearances

union requirements

OHS requirements

building codes and regulations

heritage listings

noise control.

Assessment may involve

discussions with client

visual inspections

review of client floor plans and supporting documentation

questioning police, insurance companies and other bodies.

Applicable legislation, codes and national standards may relate to:

relevant Commonwealth/State/Territory legislation which affect organisational operation:

Occupational Health and Safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity.

licensing arrangements

Australian Standards, quality assurance and certification requirements

relevant industry Codes of Practice

trade practices, award and enterprise agreements

privacy related legislation.

Information may include:

insurance policy agreements

special rooms or areas requiring higher level of protection

current/proposed operating environments, assets and systems

activities and functions

existing security systems/equipment

existing management strategies

business and operational plans

incident history.

Site assessment may involve:

type and condition of building structures

site restrictions, regulations and requirements

access and egress patterns

floor plan

existing security equipment/systems.

Security risks factors may include:

vandalism, trespass, break-in, burglary

unsecured windows

entry points screened from public view

external doors without deadlocks or with hinges opening outward

flimsy building materials

client habits (e.g. doors left unlocked)

adequacy of street lighting

traffic flow

neighbourhood crime rating

proximity of other buildings.

Business equipment may include:

computers, computer applications, modems

personal schedulers

e-mail, internet/intranet

facsimile machines

printers

photocopiers

scanners.

Security equipment and systems may include:

detection devices, audible/visual warning devices

cameras, monitors and control equipment

control panels, intercoms

wireless equipment, car alarms

electronic readers, electronic recognition controls

locks and locking systems

grills, lighting, boom gates, turnstiles

bank pop-up screens

smoke detection devices

electric/mechanical fire safety and fire locking systems

power supplies, batteries

security doors and door controls.

Security systems may be:

electronic

mechanical

computerised

procedural.

Documentation may include:

checklists

reports

floor plans

client briefs

specifications

schedules.

The Range of Variables provides information about the context in which the unit of competency is carried out. It allows for different work practices and work and knowledge requirements as well as for differences between organisations and workplaces. The following variables may be present for this particular unit:

Assignment instructions may include:

instructions from supervisor/management

work schedules and completion dates

specific client requirements

site requirements, security clearance and access requirements

reporting and documentation requirements

budget allocations.

Appropriate person(s) may include:

clients

site managers

project managers

engineers and technicians

technical experts

line managers/supervisors

colleagues

regulatory personnel

security consultants.

Organisational requirements may relate to:

legal and organisational operational policies and procedures

operations manuals, induction and training materials

insurance policy agreements

client and organisational confidentiality requirements

organisational goals, objectives, plans, systems and processes

employer and employee rights and responsibilities

own role, responsibility and delegation

quality and continuous improvement processes and standards

client service standards

defined resource parameters

OHS policies, procedures and programs

emergency and evacuation procedures

duty of care, code of conduct, code of ethics

access and equity policy, principles and practice

records and information systems and processes

communication channels and reporting procedures.

Client may include:

owner

property agent

tenant

building supervisor

manager

project manager

agent

government and legal instruments/agencies.

Scope may include:

protection of persons, property or assets

conformance with insurance

government or other requirements.

Site access and specific site requirements may relate to:

access and egress points, time of access

access codes, keys, passes, security clearances

union requirements

OHS requirements

building codes and regulations

heritage listings

noise control.

Assessment may involve

discussions with client

visual inspections

review of client floor plans and supporting documentation

questioning police, insurance companies and other bodies.

Applicable legislation, codes and national standards may relate to:

relevant Commonwealth/State/Territory legislation which affect organisational operation:

Occupational Health and Safety

environmental issues

equal employment opportunity

industrial relations

anti-discrimination and diversity.

licensing arrangements

Australian Standards, quality assurance and certification requirements

relevant industry Codes of Practice

trade practices, award and enterprise agreements

privacy related legislation.

Information may include:

insurance policy agreements

special rooms or areas requiring higher level of protection

current/proposed operating environments, assets and systems

activities and functions

existing security systems/equipment

existing management strategies

business and operational plans

incident history.

Site assessment may involve:

type and condition of building structures

site restrictions, regulations and requirements

access and egress patterns

floor plan

existing security equipment/systems.

Security risks factors may include:

vandalism, trespass, break-in, burglary

unsecured windows

entry points screened from public view

external doors without deadlocks or with hinges opening outward

flimsy building materials

client habits (e.g. doors left unlocked)

adequacy of street lighting

traffic flow

neighbourhood crime rating

proximity of other buildings.

Business equipment may include:

computers, computer applications, modems

personal schedulers

e-mail, internet/intranet

facsimile machines

printers

photocopiers

scanners.

Security equipment and systems may include:

detection devices, audible/visual warning devices

cameras, monitors and control equipment

control panels, intercoms

wireless equipment, car alarms

electronic readers, electronic recognition controls

locks and locking systems

grills, lighting, boom gates, turnstiles

bank pop-up screens

smoke detection devices

electric/mechanical fire safety and fire locking systems

power supplies, batteries

security doors and door controls.

Security systems may be:

electronic

mechanical

computerised

procedural.

Documentation may include:

checklists

reports

floor plans

client briefs

specifications

schedules.