NTISthis.com

Evidence Guide: BSBXCS403 - Contribute to cyber security threat assessments

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

BSBXCS403 - Contribute to cyber security threat assessments

What evidence can you provide to prove your understanding of each of the following citeria?

Contribute to reviewing workplace cyber security threats

  1. Identify relevant organisational data security/protection policies and procedures
  2. Contribute to organisation-wide cyber security audits
  3. Contribute to identifying threats to workplace security of cyber security threats
Identify relevant organisational data security/protection policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contribute to organisation-wide cyber security audits

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contribute to identifying threats to workplace security of cyber security threats

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assist in assessing risks and potential business impact of cyber security threats

  1. Assist in assessing cyber security risks and their likelihood, consequences and suggested mitigation strategies
  2. Assist in reviewing industry level threats and best practice cyber security strategies
  3. Assign risk levels for identified cyber risks based on measurement scale
  4. Contribute to identifying impact of risks
Assist in assessing cyber security risks and their likelihood, consequences and suggested mitigation strategies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assist in reviewing industry level threats and best practice cyber security strategies

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assign risk levels for identified cyber risks based on measurement scale

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Contribute to identifying impact of risks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Finalise cyber security threat assessment

  1. Document impact findings that include recommendations for required responses to control risks
  2. Support the communication of cyber security threat assessment outcomes and recommendations to required personnel
  3. Seek feedback as required on assessment findings
  4. Assist in integrating feedback to finalise threat assessment
  5. Distribute or store final threat assessment according to organisational policies and procedures
Document impact findings that include recommendations for required responses to control risks

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Support the communication of cyber security threat assessment outcomes and recommendations to required personnel

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Seek feedback as required on assessment findings

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assist in integrating feedback to finalise threat assessment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Distribute or store final threat assessment according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

provide non-technical support to a cyber security threat assessment in a work area by describing three threats

communicate and distribute findings of the identified threats.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

legislative requirements relating to contributing to cyber security threat assessments, including:

data protection

implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws

established international legislation

potential organisational impact of cyber attacks

online risks affecting organisation’s operations

common procedures for cyber threat rating and modelling

strategies, techniques and tools that improve an organisation’s cyber security and audit processes

organisational policies and procedures for information security, including:

confidentiality, integrity, and availability

communicating threat assessment findings.