Assessor Resource

BSBXCS403
Contribute to cyber security threat assessments

Assessment tool

Version 1.0
Issue Date: May 2024


This unit describes the skills and knowledge required to support maintaining a cyber secure network through identifying cyber security threats for an organisation.

It applies to those working in a broad range of industries who as part of their job role contribute to assessments of level of risk relating to real and potential cyber security breaches.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

You may want to include more information here about the target group and the purpose of the assessments (eg formative, summative, recognition)



Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

provide non-technical support to a cyber security threat assessment in a work area by describing three threats

communicate and distribute findings of the identified threats.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to contributing to cyber security threat assessments, including:

data protection

implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws

established international legislation

potential organisational impact of cyber attacks

online risks affecting organisation’s operations

common procedures for cyber threat rating and modelling

strategies, techniques and tools that improve an organisation’s cyber security and audit processes

organisational policies and procedures for information security, including:

confidentiality, integrity, and availability

communicating threat assessment findings.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards and organisational procedures required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assingnment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

provide non-technical support to a cyber security threat assessment in a work area by describing three threats

communicate and distribute findings of the identified threats.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to contributing to cyber security threat assessments, including:

data protection

implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws

established international legislation

potential organisational impact of cyber attacks

online risks affecting organisation’s operations

common procedures for cyber threat rating and modelling

strategies, techniques and tools that improve an organisation’s cyber security and audit processes

organisational policies and procedures for information security, including:

confidentiality, integrity, and availability

communicating threat assessment findings.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards and organisational procedures required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Identify relevant organisational data security/protection policies and procedures 
Contribute to organisation-wide cyber security audits 
Contribute to identifying threats to workplace security of cyber security threats 
Assist in assessing cyber security risks and their likelihood, consequences and suggested mitigation strategies 
Assist in reviewing industry level threats and best practice cyber security strategies 
Assign risk levels for identified cyber risks based on measurement scale 
Contribute to identifying impact of risks 
Document impact findings that include recommendations for required responses to control risks 
Support the communication of cyber security threat assessment outcomes and recommendations to required personnel 
Seek feedback as required on assessment findings 
Assist in integrating feedback to finalise threat assessment 
Distribute or store final threat assessment according to organisational policies and procedures 

Forms

Assessment Cover Sheet

BSBXCS403 - Contribute to cyber security threat assessments
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

BSBXCS403 - Contribute to cyber security threat assessments

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: