Assessment II - Cyber Security Response

.docx

School

The University of Sydney *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

23

Uploaded by GrandStarZebra31

Report
T-1.8.1_v1 Details of Assessment Term and Year Term 4-2023 Time allowed Week 8 Assessment No 2 of 2 Assessment Weighting 50% Assessment Type Knowledge questions Due Date Week 8 Room 102 Details of Subject Qualification ICT40120 Certificate IV in Information Technology   Subject Name Cyber Security Response Details of Unit(s) of competency Unit Code (s) and Names ICTCYS402 - Identify and confirm cyber security incidents ICTSAS214 - Protect devices from spam and destructive software Details of Student Student Name College CBC Student ID 202342267 Student Declaration: I declare that the work submitted is my own and has not been copied or plagiarised from any person or source. I acknowledge that I understand the requirements to complete the assessment tasks. I am also aware of my right to appeal. The feedback session schedule and reassessment procedure were explained to me. Student’s Signature: ________Duong________ Date: ____16/11/2023____ Details of Assessor Assessor’s Name Rudi Assessment Outcome Assessment Result Competent Not Yet Competent Marks /50 Feedback to Student Progressive feedback to students, identifying gaps in competency and comments on positive improvements: ______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ ______________________________________________________________________________________ Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student. Student attended the feedback session. Student did not attend the feedback session. Assessor’s Signature: ___________________ Date: _____/_____/________ Cyber Security Response - Assessment II v.1, Last updated on 16/05/2021 Page 1
T-1.8.1_v1 Purpose of the Assessment The purpose of this assessment is to assess the student in the following learning outcomes: Competent (C) Not Yet Competent (NYC) Knowledge Evidence - ICTCYS402 - Identify and confirm cyber security incidents Knowledge of different types of cyber security incidents and attacks, including: security vulnerabilities and malware denial-of-service attack (DDOS) SQL injection (SQLi) cross-site scripting (XSS) attacks scripted attacks hardware attacks attacks against Wi Fi Knowledge of cyber security risks Knowledge of methods of testing systems, networks and applications and confirming incidents Knowledge of common procedures in: following organisational cyber security incident response plans responding to cyber security incidents Knowledge of legislative requirements applicable to identifying and reporting cyber security incidents Knowledge of organisational policies and procedures applicable to cyber security incidents, including: documenting established requirements, incidents and work performed security procedures obtaining and analysing system, network and application information cyber security incident response processes and plans establishing reporting procedures. Knowledge Evidence - ICTSAS214 - Protect devices from spam and destructive software Spam types and destructive software on a range of different devices including: desktop computers laptops tablets mobile and smartphones wearables media players Organisational procedures regarding: protective measures against spam and destructive software software updates software security and spam filter settings protective procedures for spam and destructive software removal documenting and reporting outcome of protective Cyber Security Response - Assessment II v.1, Last updated on 16/05/2021 Page 2
T-1.8.1_v1 measures Spam and virus intrusions and remedial actions Types of protective applications used against viruses and spam Operating systems features and components Components of hardware that may be affected by spam Technical records, vendor documentation, enterprise procedures and guidelines. Assessment/evidence gathering conditions Each assessment component is recorded as either Competent (C) or Not Yet Competent (NYC). A student can only achieve competence when all assessment components listed under “Purpose of the assessment” section are recorded as competent. Your trainer will give you feedback after the completion of each assessment . A student who is assessed as NYC (Not Yet Competent) is eligible for re-assessment. Resources required for this Assessment Computer with relevant software applications and access to internet Weekly eLearning notes relevant to the tasks/questions Instructions for Students Please read the following instructions carefully This assessment must be completed In class At home The assessment is to be completed according to the instructions given by your assessor. Feedback on each task will be provided to enable you to determine how your work could be improved. You will be provided with feedback on your work within two weeks of the assessment due date. All other feedback will be provided by the end of the term. Should you not answer the questions correctly, you will be given feedback on the results and your gaps in knowledge. You will be given another opportunity to demonstrate your knowledge and skills to be deemed competent for this unit of competency. If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. Please refer to the College re-assessment for more information ( Student handbook ). Cyber Security Response - Assessment II v.1, Last updated on 16/05/2021 Page 3
T-1.8.1_v1 Assessment 2 – Writing Questions Assessment type: Written Questions Assessment task description: The Knowledge Test is comprised of 11 written questions. You must respond to all questions and submit them to your Trainer/Assessor. Applicable conditions: This knowledge test is untimed and are conducted as open book tests (this means you are able to refer to your textbook during the test). You must read and respond to all questions. You may handwrite/use computers to answer the questions. You must complete the task independently. As you complete this assessment task you are predominately demonstrating your written skills and knowledge to your trainer/assessor. Instructions for answering written questions: Complete a written assessment consisting of a series of questions. You will be required to correctly answer all the questions. Do not start answering questions without understanding what is required from you. Read the questions carefully and critically analyse them for a few seconds, this will help you to identify what is really needed. Your answers must demonstrate an understanding and application of relevant concepts, critical thinking, and good writing skills. Be concise to the point and write answers according to the given word-limit to each question and do not provide irrelevant information. Be careful, quantity is not quality. When you quote, paraphrase, summaries or copy information from the sources you are using to write your answers/research your work, you must always acknowledge the source. Cyber Security Response - Assessment II v.1, Last updated on 16/05/2021 Page 4
T-1.8.1_v1 Purpose of the assessment The purpose of this assessment task is to identify, confirm and report cyber security incidents in an organisation in a range of contexts and industry settings and reduce the risk of a device’s operation being affected by spam or destructive software by implementing a range of protective cyber security procedures. Knowledge of different types of cyber security incidents and attacks, including: o security vulnerabilities and malware o denial-of-service attack (DDOS) o SQL injection (SQLi) o cross-site scripting (XSS) attacks o scripted attacks o hardware attacks o attacks against Wi Fi Knowledge of cyber security risks Knowledge of methods of testing systems, networks and applications and confirming incidents Knowledge of common procedures in: o following organisational cyber security incident response plans o responding to cyber security incidents Knowledge of legislative requirements applicable to identifying and reporting cyber security incidents Knowledge of organisational policies and procedures applicable to cyber security incidents, including: o documenting established requirements, incidents and work performed o security procedures o obtaining and analysing system, network and application information o cyber security incident response processes and plans o establishing reporting procedures. Spam types and destructive software on a range of different devices including: o desktop computers o laptops o tablets o mobile and smartphones o wearables o media players Organisational procedures regarding: o protective measures against spam and destructive software o software updates o software security and spam filter settings o protective procedures for spam and destructive software removal o documenting and reporting outcome of protective measures Spam and virus intrusions and remedial actions Types of protective applications used against viruses and spam Operating systems features and components Components of hardware that may be affected by spam Technical records, vendor documentation, enterprise procedures and guidelines. Cyber Security Response - Assessment II v.1, Last updated on 16/05/2021 Page 5
T-1.8.1_v1 Marking Sheet for Trainers Marking List Marks out of Question 1 /6 Question 2 /6 Question 3 /6 Question 4 /6 Question 5 /6 Question 6 /10 Question 7 /2 Question 8 /2 Question 9 /2 Question 10 /2 Question 11 /2 TOTAL /50 Cyber Security Response - Assessment II v.1, Last updated on 16/05/2021 Page 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help