BSBXCS402_AE_CS2of2_StudentName
.docx
keyboard_arrow_up
School
TAFE NSW - Sydney Institute *
*We aren’t endorsed by this school
Course
BSBXCS402
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
38
Uploaded by CoachBoarMaster1025
Case study assessment 2 of 2
Criteria
Unit code and name
BSBXCS402 - Promote workplace cyber security awareness and best practices Qualification/Course code and name Student details
Student number
STUDENT ID
Student name
STUDENT NAME
Assessment declaration
Note: If you are an online student, you will be required to complete this declaration on the TAFE NSW online learning platform when you upload your assessment.
This assessment is my original work and has not been:
plagiarised or copied from any source without providing due acknowledgement.
written for me by any other person except where such collaboration has been authorised by the Teacher/Assessor concerned.
Student signature and date
Document title: BSBXCS402_
AE_CS_2of2
Page 1 of 38
Resource ID: Enter TBS_21_008_BSBXCS402_AE_CS_2of2
STUDENT NAME:
Version:
20220516
Date created:
06/04/2021
Date modified:
11/8/2021
For queries, please contact:
SkillsPoint
Technology and Business Services Location Ultimo NSW
© 2021 TAFE NSW
RTO Provider Number 90003 | CRICOS Provider Code: 00591E
This assessment can be found in the: Learning Bank
The contents in this document is copyright © TAFE NSW 2021 and should not be reproduced without the permission of TAFE NSW. Information contained in this document is correct at the time of printing: 1 January 2024. For current information please refer to our website or your Teacher/Assessor as appropriate.
Document title: BSBXCS402_
AE_CS_2of2
Page 2 of 38
Resource ID: Enter TBS_21_008_BSBXCS402_AE_CS_2of2
STUDENT NAME:
Assessment instructions
Table 1 Assessment instructions
Assessment details
Instructions
Assessment overview
The aim of this assessment is to assess your knowledge and performance required to promote cyber security in a work area. Assessment event number
2 of 2
Instructions for this assessment
This is a case study assessment that assesses your knowledge and performance of skills required by the unit.
This assessment is in 3 parts:
1.
Develop cyber security awareness
2.
Support effective cyber security practices (includes a Role Play with the observation Checklist)
3.
Review cyber security awareness
And is supported by:
Assessment feedback Note
: This assessment may contain links to external resources. If a link does not work, copy and paste the URL directly into your browser.
Submission instructions On completion of this assessment, you are required to submit it to your teacher/assessor for marking. Where possible, submission and upload of all required assessment files should be via the TAFE NSW online learning platform.
Ensure you have included your name at the bottom of each page of documents you submit.
It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment.
Document title: BSBXCS402_
AE_CS_2of2
Page 3 of 38
Resource ID: Enter TBS_21_008_BSBXCS402_AE_CS_2of2
STUDENT NAME:
What do I need to do to achieve a satisfactory result?
To achieve a satisfactory result for this assessment you must answer all the questions correctly.
If a resit is required to achieve a satisfactory result it will be conducted at an agreed time after a suitable revision period.
What do I need to provide?
•
TAFE NSW student account username and password. If you do not know your username and password, contact your campus or service centre on 131601.
•
Computer or other device with word processing software and internet access
What the Teacher/Assesso
r will provide
•
Access to this assessment and learning resources, including the student workbook (only for campus online students) if applicable. For TAFE Digital students all their learning material is to be accessed online via TDC only as applicable and any supporting documents or links. •
Computer with word processing software, MS PowerPoint and internet access if completing in the classroom.
•
Resource file BSBXCS402_AE_Appx_SR1.zip
(Long URL: https://share.tafensw.edu.au/share/items/5b170e5b-b7c4-4943-bb13-
87eb23049cd0/0/?attachment.uuid=78ed227b-d1f3-4625-a9ec-b9b13274a1f3 )
which includes files that are referenced throughout the assessment:
o
Gelos Enterprises Cyber Security Awareness Survey results
(Gelos_Cyber_Security_Awareness_Survey_Results.xlsx)
o
Gelos Enterprises Cyber Security Practices Survey results
(Gelos_Cyber_Security_Practices_Survey_Results.xlsx)
o
Gelos Enterprises Cyber Security Training Staff Attendance Sheets
(Gelos_Cyber_Security_Training_Staff_Attendance_Sheets.xls)
Gelos Enterprises Policies and procedures relating to cyber security awareness and practices BSBXCS402_TL_PoliciesProcedures.docx
(Long URL: https://share.tafensw.edu.au/share/items/7955d503-2f54-4537-a55c-
8d285823f1a7/0/?attachment.uuid=b8e1e03e-6e0d-481d-88c3-193589c63a7a
)
Due date Refer to Unit Assessment Guide/Training Plan for due dates
Document title: BSBXCS402_
AE_CS_2of2
Page 4 of 38
Resource ID: Enter TBS_21_008_BSBXCS402_AE_CS_2of2
STUDENT NAME:
Time allowed
Location
Three (3) hours (indicative only)
Assessment to be completed both inside and outside of class. TAFE Digital students will complete and submit their assessment online.
Assessment feedback, review or appeals
In accordance with the TAFE NSW policy Manage Assessment Appeals,
all students have the right to appeal an assessment decision in relation to how the assessment was conducted and the outcome of the assessment. Appeals must be lodged within 14 working days
of the formal notification of the result of the assessment. If you would like to request a review of your results or if you have any concerns about your results, contact your teacher/assessor or Head Teacher. If they are unavailable, contact the Student Administration Officer.
Contact your Head Teacher for the assessment appeals procedures at your college/campus.
Specific task instructions
The instructions and the criteria in the case study will be used by the teacher/assessor to determine whether you have satisfactorily completed the Case Study Scenario. Use these instructions and criteria to ensure you demonstrate the required knowledge.
Written Answers
In this assessment you must word-process all your answers. Ensure that your answers are tidy and accurate with correct spelling and grammar. It is important that you always enter your name on the bottom of each page of the assessment including any additional pages.
Resources
Throughout this assessment there are explicit references to a range of resources including software applications, hardware, tools and website links. At the time of writing this assessment, the versions and links of these resources were correct. It is expected that over time this may change. Document title: BSBXCS402_
AE_CS_2of2
Page 5 of 38
Resource ID: Enter TBS_21_008_BSBXCS402_AE_CS_2of2
STUDENT NAME:
In addition, your teacher/assessor may prefer a suitable alternative resource. They will let you know if there are any alterations to prescribed resources. Contact your teacher/assessor if there are any issues associated with a resource. Document title: BSBXCS402_
AE_CS_2of2
Page 6 of 38
Resource ID: Enter TBS_21_008_BSBXCS402_AE_CS_2of2
STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Try to design a sign-up sheet for a learning website. Ask the user for the following information:
● Name
● Preferred username
● Password
● Email. Please research and use the appropriate input type for email input.
● Address
● A short paragraph on the user’s interests
Make sure to add a submit and reset buttons also.
arrow_forward
QUESTION 1
Draw level 1 DFD of the given scenario. Mention your brain storming as well before the drawing. A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user.
After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped.
arrow_forward
Full explan please
arrow_forward
Physical Security Survey
In this project you will perform a survey of the physical security at your school or workplace.
Identify vulnerabilities in the design and use of the following aspects of the facility:
Use of locking doors at main entrances
Access to sensitive areas
Cabling, communications, or computing equipment readily accessible
Video surveillance
Personnel badges
Loading area
Fire suppression
Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk.
Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnel
arrow_forward
Reflection Question: Creating and Editing Documents
What is the relationship between legibility and contrast?
Start a new blank document and answer each component of the questions.
Proofread your work to be certain it is error free before submitting it.
arrow_forward
Have you ever observed someone being harassed or bullied by someone else over the internet? What was your first reaction when you found out about the situation? How did you arrive at the judgment that the person had previously been the target of bullying behavior prior to your intervention?
arrow_forward
Step-By-Step Assignment Instructions
Assignment Topic:
How data breaches occur and are discovered.
Setup instructions:
Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches.
Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side.
How to submit:
Submit a summary of each data breach and answer the following questions in your response:
What was the data breach?
How was the data breach found out?
What were the threats?
What were the vulnerabilities and how did the threats interact with them?
Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach?
Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.
arrow_forward
Crediting the creator of a work you find on the WWW gives you the right to use it on your website.
True
False
arrow_forward
Participate in the discussion forum by writing a response to the guide question:
Discuss the similarity of DIKW to the nursing process. Provide some examples.
arrow_forward
Alert dont submit AI generated answer.
arrow_forward
Assigning group access controls eliminates individual accountability.
Select one:
O True
O False
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Try to design a sign-up sheet for a learning website. Ask the user for the following information: ● Name ● Preferred username ● Password ● Email. Please research and use the appropriate input type for email input. ● Address ● A short paragraph on the user’s interests Make sure to add a submit and reset buttons also.arrow_forwardQUESTION 1 Draw level 1 DFD of the given scenario. Mention your brain storming as well before the drawing. A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user. After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped.arrow_forwardFull explan pleasearrow_forward
- Physical Security Survey In this project you will perform a survey of the physical security at your school or workplace. Identify vulnerabilities in the design and use of the following aspects of the facility: Use of locking doors at main entrances Access to sensitive areas Cabling, communications, or computing equipment readily accessible Video surveillance Personnel badges Loading area Fire suppression Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk. Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnelarrow_forwardReflection Question: Creating and Editing Documents What is the relationship between legibility and contrast? Start a new blank document and answer each component of the questions. Proofread your work to be certain it is error free before submitting it.arrow_forwardHave you ever observed someone being harassed or bullied by someone else over the internet? What was your first reaction when you found out about the situation? How did you arrive at the judgment that the person had previously been the target of bullying behavior prior to your intervention?arrow_forward
- Step-By-Step Assignment Instructions Assignment Topic: How data breaches occur and are discovered. Setup instructions: Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches. Then pick 3 different types of data breaches and report on one data breach each. The types are located on the left hand side. How to submit: Submit a summary of each data breach and answer the following questions in your response: What was the data breach? How was the data breach found out? What were the threats? What were the vulnerabilities and how did the threats interact with them? Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach? Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page. In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.arrow_forwardCrediting the creator of a work you find on the WWW gives you the right to use it on your website. True Falsearrow_forwardParticipate in the discussion forum by writing a response to the guide question: Discuss the similarity of DIKW to the nursing process. Provide some examples.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning