Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

BSBXCS302 Mapping and Delivery Guide
Identify and report online security threats

Version 1.0
Issue Date: May 2024


Qualification -
Unit of Competency BSBXCS302 - Identify and report online security threats
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills and knowledge required to identify and report online security threats to limit potential impact of cyber security breaches. It applies to those working in a broad range of industries and job roles under some supervision and guidance who encounter and report online threats during the course of their work.No licensing, legislative or certification requirements apply to this unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Skills must be assessed in a workplace or simulated environment where conditions are typical of a work environment requiring cyber secure practices, processes and procedures.

Access is required to:

information and data sources relating to cyber security

device with active internet connection

internet browser

industry standards and organisational procedures required to demonstrate the performance evidence.

Assessors of this unit must satisfy the requirements for assessors in applicable vocational education and training legislation, frameworks and/or standards.

Prerequisites/co-requisites
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Identify online security threats
  • Review internal policies, procedures and plans relating potential online security breaches
  • Identify features of common types of potentially fraudulent communications
  • Implement techniques to verify suspicious requests for information
       
Element: Respond to an online security breach
  • Block and report potential security breaches on computer and mobile device according to organisational policies and procedures
  • Respond to actual security breach or cyber security incident according to organisational response plan
  • Report security breach or cyber security incident according to legislative requirements and organisational policies and procedures
       
Element: Support post- breach review
  • Provide information to required personnel to assist in documenting potential and actual breaches
  • Support post-incident review and identifying lessons learnt
  • Contribute updates to cyber security incident response plan as required and within scope of own role
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

identify and report three different online security threats in a work area.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to identifying and reporting online security threats, including:

data protection

implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws

established international legislation

organisational policies and procedures relating to online information security breaches, including:

blocking and reporting potential security breaches

escalation routes for cyber security issues

common types of online scams and security risks, including phishing scams

common techniques of phishing and spear phishing used by attackers, including:

spam email and SMS text

social engineering, including telephone calls, social media and website requests for information

basic principles of cyber security

indicators of insecure connection to websites, in particular where data is being collected

Australian government sources of information on current online security threats

common online security threats to which individuals might be exposed to, including physical threats

common procedures for:

mitigating online security threats

following organisational cyber security incident response plan

responding to cyber security breaches.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Review internal policies, procedures and plans relating potential online security breaches 
Identify features of common types of potentially fraudulent communications 
Implement techniques to verify suspicious requests for information 
Block and report potential security breaches on computer and mobile device according to organisational policies and procedures 
Respond to actual security breach or cyber security incident according to organisational response plan 
Report security breach or cyber security incident according to legislative requirements and organisational policies and procedures 
Provide information to required personnel to assist in documenting potential and actual breaches 
Support post-incident review and identifying lessons learnt 
Contribute updates to cyber security incident response plan as required and within scope of own role 

Forms

Assessment Cover Sheet

BSBXCS302 - Identify and report online security threats
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

BSBXCS302 - Identify and report online security threats

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: