Assessor Resource

BSBXCS401
Maintain security of digital devices

Assessment tool

Version 1.0
Issue Date: May 2024


This unit describes the skills and knowledge required ensure the cyber security of digital devices.

It applies to those working in a broad range of industries who as part of their job role ensure the security of digital devices used.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)



Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

use best practice protection strategies to maintain the security of two different electronic devices over the life of a small project or work cycle

conduct gap analysis to evaluate effectiveness of all applied best practice strategies.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

external party security risks and methods for mitigating risk

industry-accepted best practice protection strategies for improving security on digital devices:

password management

use of anti-virus software

virtual private network (VPN) use on public Wi-Fi

router settings

fundamentals of two-factor authentication

encryption

patching software applications

risk management methodologies

tools and techniques to conduct gap analysis of strategy performance

data protection requirements for:

stored data

data in transit

data in third party applications

mobile device security strategies.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards and organisational procedures required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

use best practice protection strategies to maintain the security of two different electronic devices over the life of a small project or work cycle

conduct gap analysis to evaluate effectiveness of all applied best practice strategies.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

external party security risks and methods for mitigating risk

industry-accepted best practice protection strategies for improving security on digital devices:

password management

use of anti-virus software

virtual private network (VPN) use on public Wi-Fi

router settings

fundamentals of two-factor authentication

encryption

patching software applications

risk management methodologies

tools and techniques to conduct gap analysis of strategy performance

data protection requirements for:

stored data

data in transit

data in third party applications

mobile device security strategies.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards and organisational procedures required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Create and maintain register of digital devices on organisation’s network 
Confirm what information is held on the registered devices 
Categorise level of risk associated with each device based on sensitivity of information stored 
Select required security protocol to manage level of risk associated with each device 
Install and run latest anti-malware on each device 
Create strong passwords across personal and work accounts 
Switch on two-factor authentication where available 
Encrypt devices according to instructions 
Develop associated physical security plan and communicate this to whole organisation 
Review number of breaches and business impact over review period 
Monitor latest developments in digital security 
Support organisation to select most appropriate security strategies 
Apply updates to software and applications across own desktop and mobile devices 
Ensure that new devices are updated and configured correctly as part of initial start-up procedure 

Forms

Assessment Cover Sheet

BSBXCS401 - Maintain security of digital devices
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

BSBXCS401 - Maintain security of digital devices

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: