Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Identify existing and potential security threats to own personal online profile
  2. Audit own personal online profile for identified security threats
  3. Address identified existing and potential security threats to own personal online profile

Knowledge Evidence

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to reporting cyber security threats

organisational policies and procedures relating to online profiles, including escalation routes for cyber security issues

basic principles of cyber security, including:

importance of data confidentiality, integrity and availability

common cyber security terms

common cyber security threats that individuals might be exposed to online

secure internet browsing

risk factors relating to own personal online profile, including:

password management practices:

strength of created passwords

number of passwords used for multiple accounts

frequency of change to passwords

own work role within organisation

regular tasks in own work that raise personal risk level, including internet browsing

potential targets for cyber attack in own direct professional network

protocols for handling personally identifiable information

physical safety of devices

industry-specific risk factors and their risk to online profiles

common strategies, tools and techniques for improving security of own personal online profile, including for:

password protection

secure password management and account replicating and splitting

fundamentals of two-factor authentication

billing and account privacy settings

software patching

connecting to public Wi-Fi via virtual private networks (VPNs)

common methods and practices for:

responding to cyber security issues, including reporting protocols

secure internet browsing, including banking and email

common cyber security threats that individuals and data might be exposed to, including:

phishing

social engineering

social media

malware

physical threats, including data loss due to working insecurely in public spaces.