ICTCYS608 Student Assessment Guide

.docx

School

Deakin University *

*We aren’t endorsed by this school

Course

606

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

32

Uploaded by BrigadierAnteaterMaster276

Report
Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments Student Assessment Guide: ICTCYS608 Version: v21.0 Page 2 of 32 Developed by: ACBI Approved by: DoS Issued: September 2021 Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments Copyright 2021 Australian College of Business Intelligence All rights reserved Version: 21.0 Date Modified: September 2021 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Australian College of Business Intelligence. Disclaimer: The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so. Student Assessment Guide: ICTCYS608 Version: v21.0 Page 3 of 32 Developed by: ACBI Approved by: DoS Issued: September 2021 Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments Content s 1. Assessment Information ...................................................................................................... 4 A. Purpose of assessment ........................................................................................................................ 4 B. What you are required to do ............................................................................................................... 4 C. Competencies being assessed ............................................................................................................. 4 D. Important resources for completing this assessment ......................................................................... 5 E. A note on plagiarism and referencing .................................................................................................. 5 F. A note on questions with role plays ..................................................................................................... 6 G. Instructions for completing this assessment ....................................................................................... 6 2. Assessment Coversheet ....................................................................................................... 7 3. Assessment Questions ......................................................................................................... 8 A. Task A - Demonstrate knowledge of cyber security risk assessments ................................................. 8 B. Task B – Prepare to perform risk assessment .................................................................................... 12 C. Task C – Perform risk assessment ...................................................................................................... 16 D. Task D – Finalise risk assessment ...................................................................................................... 18 4. Student Self Checklist ........................................................................................................ 21 A. Student Self Checklist for Tasks A - D ................................................................................................ 21 Student Assessment Guide: ICTCYS608 Version: v21.0 Page 4 of 32 Developed by: ACBI Approved by: DoS Issued: September 2021 Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments 1. Assessment Information A. Purpose of assessment This assessment will develop your skills and knowledge required to conduct a risk assessment and analysis in a business environment. B. What you are required to do For this assessment, you are required to complete 4 tasks: Task A – Demonstrate knowledge of cyber security risk assessments Task B – Prepare to perform risk assessment Task C – Perform risk assessment Task D – Finalise risk assessment All tasks of this assessment require you to use the provided case study information relating to the fictional company EzyMart. C. Competencies being assessed Elements To achieve competency in this unit you must demonstrate your ability to: 1. Prepare to perform risk assessment 2. Perform risk assessment 3. Finalise risk assessment Performance Evidence Evidence of the ability to: Conduct a cyber security risk assessment on at least one occasion Knowledge Evidence Student Assessment Guide: ICTCYS608 Version: v21.0 Page 5 of 32 Developed by: ACBI Approved by: DoS Issued: September 2021 Review: September 2021
ICT60220 Advanced Diploma of Information Technology (Cyber Security) Student Assessment Guide: ICTCYS608 Perform cyber security risk assessments To complete the unit requirements safely and effectively, you must: Risk assessment methodologies and processes required in cyber security Methodologies of identifying and measuring risk culture and risk appetite in the cyber environment Sources of legislative requirements required in cyber security Organisational procedures applicable to conducting a cyber security risk assessment including, Documenting risk assessment processes and findings Establishing requirements and features of cyber security risk assessment processes For further information on the competencies of this unit, please refer to: https://training.gov.au/Training/Details/ICTCYS608 D. Important resources for completing this assessment To complete this assessment, please refer to the following resources provided on Moodle: ICTCYS608 Perform cyber security risk assessments learner guide ICTCYS608 Marking Guide ICTCYS608 Case study folder Additional student assessment information E. A note on plagiarism and referencing Plagiarism is a form of theft where the work, ideas, inventions etc. of other people are presented as your own. When quoting or paraphrasing from a source such as the Internet, the source must be recognised. If you are quoting a source, make sure to acknowledge this by including “quotation marks” around the relevant words/sentences or ideas. Note the source at the point at which it is included within your assessment, such as by using a citation. Then list the full details of the source in a ‘references’ section at the end of your assessment. All sources used for your assessment should be detailed in a ‘references’ section. It is advisable to never copy another person’s work. Student Assessment Guide: ICTCYS608 Version: v21.0 Page 6 of 32 Developed by: ACBI Approved by: DoS Issued: September 2021 Review: September 2021
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help