NTISthis.com

Evidence Guide: ICTCYS610 - Protect critical infrastructure for organisations

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTCYS610 - Protect critical infrastructure for organisations

What evidence can you provide to prove your understanding of each of the following citeria?

Research critical infrastructure need for an organisation

  1. Research organisation’s need for critical infrastructure protection and document findings according to organisational requirements
  2. Analyse organisation’s existing critical infrastructure protection plan
  3. Determine effectiveness and alignment of existing plan to organisational requirements
  4. Identify operational systems, critical assets, segmentation and legislative requirements
  5. Determine level of protection, vulnerability, risk and mitigation according to organisational requirements
Research organisation’s need for critical infrastructure protection and document findings according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse organisation’s existing critical infrastructure protection plan

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine effectiveness and alignment of existing plan to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Identify operational systems, critical assets, segmentation and legislative requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine level of protection, vulnerability, risk and mitigation according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop protection strategy

  1. Consolidate research findings and map critical processes according to organisational requirements
  2. Develop and document critical infrastructure protection plan according to organisational policies and procedures
  3. Submit protection plan to required personnel and seek and respond to feedback
Consolidate research findings and map critical processes according to organisational requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Develop and document critical infrastructure protection plan according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit protection plan to required personnel and seek and respond to feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement protection strategy

  1. Backup data according to organisational policies and procedures
  2. Secure devices according to protection plan and technical requirements
  3. Implement network segmentation according to protection plan and technical requirements
  4. Apply software patches according to technical requirements
  5. Implement additional protection plan requirements and asset management processes
Backup data according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Secure devices according to protection plan and technical requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement network segmentation according to protection plan and technical requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply software patches according to technical requirements

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement additional protection plan requirements and asset management processes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Test implementation outcomes

  1. Test deployment of protection plan according to organisational policies and procedures
  2. Obtain and analyse results according to organisational policies and procedures
  3. Determine and document additional protection methods for critical infrastructure protection
  4. Submit documentation to required personnel and seek and respond to feedback
Test deployment of protection plan according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Obtain and analyse results according to organisational policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Determine and document additional protection methods for critical infrastructure protection

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Submit documentation to required personnel and seek and respond to feedback

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Required Skills and Knowledge

The candidate must demonstrate the ability to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including evidence of the ability to:

research, develop, implement and test an organisation’s critical protection infrastructure plan.

In the course of the above, the candidate must:

analyse operating environment

document processes and outcomes.

The candidate must be able to demonstrate knowledge to complete the tasks outlined in the elements, performance criteria and foundation skills of this unit, including knowledge of:

critical infrastructure sectors and assets

cyber security methodologies required to protect infrastructure for organisations

legislative requirements applicable to researching, analysing and developing critical infrastructure protection policies.