NTISthis.com

Evidence Guide: BSBXCS401 - Maintain security of digital devices

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

BSBXCS401 - Maintain security of digital devices

What evidence can you provide to prove your understanding of each of the following citeria?

Identify appropriate security for digital devices

  1. Create and maintain register of digital devices on organisation’s network
  2. Confirm what information is held on the registered devices
  3. Categorise level of risk associated with each device based on sensitivity of information stored
  4. Select required security protocol to manage level of risk associated with each device
Create and maintain register of digital devices on organisation’s network

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Confirm what information is held on the registered devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Categorise level of risk associated with each device based on sensitivity of information stored

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Select required security protocol to manage level of risk associated with each device

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply protection strategies to digital devices

  1. Install and run latest anti-malware on each device
  2. Create strong passwords across personal and work accounts
  3. Switch on two-factor authentication where available
  4. Encrypt devices according to instructions
  5. Develop associated physical security plan and communicate this to whole organisation
Install and run latest anti-malware on each device

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Create strong passwords across personal and work accounts

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Switch on two-factor authentication where available

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Encrypt devices according to instructions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop associated physical security plan and communicate this to whole organisation

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate effectiveness of applied protection strategies

  1. Review number of breaches and business impact over review period
  2. Monitor latest developments in digital security
  3. Support organisation to select most appropriate security strategies
Review number of breaches and business impact over review period

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitor latest developments in digital security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Support organisation to select most appropriate security strategies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Patch software across multiple devices

  1. Apply updates to software and applications across own desktop and mobile devices
  2. Ensure that new devices are updated and configured correctly as part of initial start-up procedure
Apply updates to software and applications across own desktop and mobile devices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Ensure that new devices are updated and configured correctly as part of initial start-up procedure

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

use best practice protection strategies to maintain the security of two different electronic devices over the life of a small project or work cycle

conduct gap analysis to evaluate effectiveness of all applied best practice strategies.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

external party security risks and methods for mitigating risk

industry-accepted best practice protection strategies for improving security on digital devices:

password management

use of anti-virus software

virtual private network (VPN) use on public Wi-Fi

router settings

fundamentals of two-factor authentication

encryption

patching software applications

risk management methodologies

tools and techniques to conduct gap analysis of strategy performance

data protection requirements for:

stored data

data in transit

data in third party applications

mobile device security strategies.