ICTCYS608 Student Assessment Guide
.docx
keyboard_arrow_up
School
Deakin University *
*We aren’t endorsed by this school
Course
606
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
32
Uploaded by BrigadierAnteaterMaster276
Student
Assessment Guide:
ICTCYS608 Perform cyber security risk
assessments
ICT60220 Advanced Diploma of Information Technology (Cyber Security)
Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments
Student Assessment Guide: ICTCYS608
Version: v21.0
Page 2 of 32
Developed by: ACBI
Approved by: DoS
Issued: September 2021
Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security)
Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments
Copyright 2021
Australian College of Business Intelligence
All rights reserved
Version: 21.0
Date Modified: September 2021
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Australian College of Business Intelligence.
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so.
Student Assessment Guide: ICTCYS608
Version: v21.0
Page 3 of 32
Developed by: ACBI
Approved by: DoS
Issued: September 2021
Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security)
Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments
Content
s
1. Assessment Information
......................................................................................................
4
A. Purpose of assessment
........................................................................................................................
4
B. What you are required to do
...............................................................................................................
4
C. Competencies being assessed
.............................................................................................................
4
D. Important resources for completing this assessment
.........................................................................
5
E. A note on plagiarism and referencing
..................................................................................................
5
F. A note on questions with role plays
.....................................................................................................
6
G. Instructions for completing this assessment
.......................................................................................
6
2. Assessment Coversheet
.......................................................................................................
7
3. Assessment Questions
.........................................................................................................
8
A. Task A - Demonstrate knowledge of cyber security risk assessments
.................................................
8
B. Task B – Prepare to perform risk assessment
....................................................................................
12
C. Task C – Perform risk assessment
......................................................................................................
16
D. Task D – Finalise risk assessment
......................................................................................................
18
4. Student Self Checklist
........................................................................................................
21
A. Student Self Checklist for Tasks A - D
................................................................................................
21
Student Assessment Guide: ICTCYS608
Version: v21.0
Page 4 of 32
Developed by: ACBI
Approved by: DoS
Issued: September 2021
Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security)
Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments
1. Assessment Information
A. Purpose of assessment
This assessment will develop your skills and knowledge required to conduct a risk assessment and analysis in a business environment.
B. What you are required to do
For this assessment, you are required to complete 4 tasks:
Task A – Demonstrate knowledge of cyber security risk assessments
Task B – Prepare to perform risk assessment
Task C – Perform risk assessment
Task D – Finalise risk assessment
All tasks of this assessment require you to use the provided case study information relating to the fictional company EzyMart.
C. Competencies being assessed
Elements
To achieve competency in this unit you must demonstrate your ability to:
1.
Prepare to perform risk assessment
2.
Perform risk assessment
3.
Finalise risk assessment
Performance Evidence
Evidence of the ability to:
Conduct a cyber security risk assessment on at least one occasion Knowledge Evidence
Student Assessment Guide: ICTCYS608
Version: v21.0
Page 5 of 32
Developed by: ACBI
Approved by: DoS
Issued: September 2021
Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security)
Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments
To complete the unit requirements safely and effectively, you must:
Risk assessment methodologies and processes required in cyber security
Methodologies of identifying and measuring risk culture and risk appetite in the cyber environment
Sources of legislative requirements required in cyber security
Organisational procedures applicable to conducting a cyber security risk assessment including,
Documenting risk assessment processes and findings
Establishing requirements and features of cyber security risk assessment processes
For further information on the competencies of this unit, please refer to: https://training.gov.au/Training/Details/ICTCYS608
D. Important resources for completing this assessment
To complete this assessment, please refer to the following resources provided on Moodle:
ICTCYS608 Perform cyber security risk assessments learner guide
ICTCYS608 Marking Guide
ICTCYS608 Case study folder
Additional student assessment information
E. A note on plagiarism and referencing
Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your
own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you
are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never
copy another person’s work.
Student Assessment Guide: ICTCYS608
Version: v21.0
Page 6 of 32
Developed by: ACBI
Approved by: DoS
Issued: September 2021
Review: September 2021
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help