The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Prepare to protect integrity of big data
|
|
Identify big data set to be protected Completed |
Evidence:
|
Review workplace governance arrangements in place for protecting the integrity of big data Completed |
Evidence:
|
Verify security of big data platform, including cloud security, according to organisational policies and procedures Completed |
Evidence:
|
Confirm security arrangements in place relating to big data secure storage and transaction logging Completed |
Evidence:
|
Apply policies to protect big data
|
|
Apply privacy policies to all data assets that require privacy protection Completed |
Evidence:
|
Apply security policies to all data assets that require confidentiality Completed |
Evidence:
|
Apply intellectual property policies to all data assets that contain private and confidential business information Completed |
Evidence:
|
Monitor big data integrity
|
|
Check encryption and undertake real-time monitoring of logs to identify anomalies that arise Completed |
Evidence:
|
Identify and report malfunctioning infrastructure and any attacks on infrastructure that pose a threat to data integrity Completed |
Evidence:
|
Conduct privacy impact assessments on big data Completed |
Evidence:
|
Confirm that data protection practices comply with required standards Completed |
Evidence:
|
Respond to breaches in big data integrity
|
|
Identify where big data breaches have occurred according to organisational policies and procedures Completed |
Evidence:
|
Escalate data breach incidents according to organisational policies Completed |
Evidence:
|
Consult with required internal and external stakeholders and communicate breach efficiently Completed |
Evidence:
|
Audit big data breaches and report findings Completed |
Evidence:
|
Support management with post-breach and audit reviews Completed |
Evidence:
|