Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Undertake the risk assessment
  2. Secure the operating systems
  3. Secure the site server
  4. Secure data transactions
  5. Monitor and document the security framework

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

summarise the Australian Computer Society Code of Ethics

explain a client business domain, its structure, function and organisation, including the organisational issues surrounding security

identify and outline the legislation, regulations, and codes of practice pertinent to website information, including:

copyright

intellectual property

privacy

ethics

outline current industry-accepted hardware and software products

describe desktop applications and operating systems (OS), as they relate to website security

explain the functions and features of:

automated intrusion detection software

authentication and access control

common stored account payment systems

cryptography

common gateway interface (CGI) scripts

generic secure protocols

stored-value payment systems

explain the implications of network address translation (NAT), related to:

securing internal, internet protocol (IP) addresses

buffer overruns and stack smashing

operating system deficiencies

the protocol stack for internet communications

physical web server security, particularly remote

describe the advantages, and disadvantages, of using a range of security features

identify and describe, host security threats.