NTISthis.com

Evidence Guide: BSBXBD407 - Protect big data integrity

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

BSBXBD407 - Protect big data integrity

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to protect integrity of big data

  1. Identify big data set to be protected
  2. Review workplace governance arrangements in place for protecting the integrity of big data
  3. Verify security of big data platform, including cloud security, according to organisational policies and procedures
  4. Confirm security arrangements in place relating to big data secure storage and transaction logging
Identify big data set to be protected

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Review workplace governance arrangements in place for protecting the integrity of big data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Verify security of big data platform, including cloud security, according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirm security arrangements in place relating to big data secure storage and transaction logging

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply policies to protect big data

  1. Apply privacy policies to all data assets that require privacy protection
  2. Apply security policies to all data assets that require confidentiality
  3. Apply intellectual property policies to all data assets that contain private and confidential business information
Apply privacy policies to all data assets that require privacy protection

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply security policies to all data assets that require confidentiality

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply intellectual property policies to all data assets that contain private and confidential business information

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor big data integrity

  1. Check encryption and undertake real-time monitoring of logs to identify anomalies that arise
  2. Identify and report malfunctioning infrastructure and any attacks on infrastructure that pose a threat to data integrity
  3. Conduct privacy impact assessments on big data
  4. Confirm that data protection practices comply with required standards
Check encryption and undertake real-time monitoring of logs to identify anomalies that arise

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify and report malfunctioning infrastructure and any attacks on infrastructure that pose a threat to data integrity

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Conduct privacy impact assessments on big data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirm that data protection practices comply with required standards

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Respond to breaches in big data integrity

  1. Identify where big data breaches have occurred according to organisational policies and procedures
  2. Escalate data breach incidents according to organisational policies
  3. Consult with required internal and external stakeholders and communicate breach efficiently
  4. Audit big data breaches and report findings
  5. Support management with post-breach and audit reviews
Identify where big data breaches have occurred according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Escalate data breach incidents according to organisational policies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Consult with required internal and external stakeholders and communicate breach efficiently

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Audit big data breaches and report findings

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Support management with post-breach and audit reviews

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

protect the integrity of two different sets of big data in a work area: one set must be of transactional big data and one set of non-transactional big data.

During the above, the candidate must apply data protection policies and protocols.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements and standards relating to protecting the integrity of big data, including data protection and privacy laws and regulations

organisational policies, procedures and protocols relating to protecting the integrity of transactional and non-transactional big data, including for:

ensuring accuracy, availability and scalability of big data

verifying security of big data platform

monitoring data discrepancies between different sources

monitoring big data integrity

identifying where big data breaches have occurred

ethical management and governance of big data, including consideration of ensuring a balance between availability and confidentiality of big data

key components of workplace governance arrangements relating to protection, performance, scalability and availability of big data, including:

procedures for creating and maintaining inventory of big data assets

policies to prevent big data being used inappropriately

protocols for dynamic and scalable access control of big data

compliance requirements and regulations relating to big data loss

key components of policies in place for protecting the confidential and private business information and intellectual property in big data assets:

privacy policies

security policies

intellectual property policies

infrastructure security, integrity and reactive security as they relate to protecting the integrity of big data.