NTISthis.com

Evidence Guide: BSBXCS302 - Identify and report online security threats

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

BSBXCS302 - Identify and report online security threats

What evidence can you provide to prove your understanding of each of the following citeria?

Identify online security threats

  1. Review internal policies, procedures and plans relating potential online security breaches
  2. Identify features of common types of potentially fraudulent communications
  3. Implement techniques to verify suspicious requests for information
Review internal policies, procedures and plans relating potential online security breaches

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify features of common types of potentially fraudulent communications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement techniques to verify suspicious requests for information

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Respond to an online security breach

  1. Block and report potential security breaches on computer and mobile device according to organisational policies and procedures
  2. Respond to actual security breach or cyber security incident according to organisational response plan
  3. Report security breach or cyber security incident according to legislative requirements and organisational policies and procedures
Block and report potential security breaches on computer and mobile device according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Respond to actual security breach or cyber security incident according to organisational response plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Report security breach or cyber security incident according to legislative requirements and organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Support post- breach review

  1. Provide information to required personnel to assist in documenting potential and actual breaches
  2. Support post-incident review and identifying lessons learnt
  3. Contribute updates to cyber security incident response plan as required and within scope of own role
Provide information to required personnel to assist in documenting potential and actual breaches

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Support post-incident review and identifying lessons learnt

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contribute updates to cyber security incident response plan as required and within scope of own role

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

identify and report three different online security threats in a work area.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to identifying and reporting online security threats, including:

data protection

implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws

established international legislation

organisational policies and procedures relating to online information security breaches, including:

blocking and reporting potential security breaches

escalation routes for cyber security issues

common types of online scams and security risks, including phishing scams

common techniques of phishing and spear phishing used by attackers, including:

spam email and SMS text

social engineering, including telephone calls, social media and website requests for information

basic principles of cyber security

indicators of insecure connection to websites, in particular where data is being collected

Australian government sources of information on current online security threats

common online security threats to which individuals might be exposed to, including physical threats

common procedures for:

mitigating online security threats

following organisational cyber security incident response plan

responding to cyber security breaches.