BSBXCS402 - Student Assessment Pack(1)

docx

School

Victoria University *

*We aren’t endorsed by this school

Course

BSBXCS402

Subject

Civil Engineering

Date

Apr 3, 2024

Type

docx

Pages

18

Uploaded by DeaconResolve13469

Report
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Unit Result Sheet This form is to be completed by the assessor and is used to record the student assessment Outcome/result for each Unit of Competency. All student submissions (Outlined below) are to be attached to this sheet before placing on the student academic file. Student results are not to be entered into the Student database unless all relevant paperwork is completed and attached to this sheet. Students must complete all assessment tasks as satisfactory (S) to be Competent (C) Student Use Student ID No NTCA230483 Student Name Mandeep Kaur Unit Code BSBXCS402 Unit Ti t le Promote workplace cyber security awareness and best practices A s s es s or U s e O n l y Initial Submission Re-Submission Please attach the following documentation to this sheet Assessment Outcome Re Assessment Outcome Assessment 1 Written Assessment S NS NA S NS NA Assessment 2 Project S NS NA S NS NA Final Assessment Result for this uni t: C / NYC Comments: A s s ess o r : I declare that I have conducted a f air , valid, reliable and flexible assessment with t his student, and I have provided appropriate f eedback. Assessor Name: Signature: Date: Student Declaration: I declare that I have been assessed in this unit, and I have been advised of my result. I am also aware of my appeal rights. Name: Mandeep Kaur Signature Mandeep Kaur Date: Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: BSBXCS402 Promote workplace cyber security awareness and best practices Assessment Tool Assessment Resource Summary Assessment Type This is a summative assessment, which requires the assessment to be conducted in conditions that are safe and replicate the workplace Assessment Tasks Assessment Task 1: Written questions Assessment Task 2: Project Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Assessment Cover Sheet Please complete cover sheet clearly and accurately for assessment tasks and other types of evidence you submit for your course. All student assessment tasks submissions including any associated checklists where applicable, are to be attached to this cover sheet. Student Use Student ID No NTCA230483 Student Name Mandeep Kaur Unit Code BSBXCS402 Unit Title Promote workplace cyber security awareness and best practices Assessment No. 1 Assessment Method Written Assessment Initial Submission Re-Submission Student Declaration I declare that: These tasks are my own work. None of this work has been completed by any other person These tasks are not plagiarised or colluded with any other student/s. I have correctly referenced all resources and reference texts throughout these assessment tasks. I have read and understood NTCA’s policy on Plagiarism, cheating and collusion and understand that if I am found to be in breach of this policy, disciplinary action may be taken against me by NTCA. I have a copy of my assessment work with me, which I can produce if the original is lost. Student Signature: Mandeep Kaur Submission Date: Assessor Use Only Outcome Satisfactory / Not Satisfactory Assessor Feedback: Assessor Name: Signature: Date: Student Submission Receipt: Your submission has been received. Please keep a copy of this record. Student ID & Name : ……………………………….…………………….….. Submission Date: …………………..……………………………. Unit Code : ………………………………..……………… Assessment No & Method: ……………………………………..….……..…………. Initial Submission Re-Submission Received By (Name): …………………………………….…. Signature: …………………..……….. Date: …………………..……………….. The results will be updated within twenty-one (21) days from your final submission . Please check your student portal regularly to make sure that your results are updated. If there are any discrepancies, please discuss with the Trainer/Student Support Officer. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Assessment Task 1: Written Assessment Task instructions This is an individual assessment. The purpose of this assessment task is to assess the students’ knowledge essential to work and communicate effectively in an ICT environment in a range of contexts and industry settings. To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, learners’ resources and slides. All questions must be answered in order to gain competency for this assessment. You may attach a separate sheet if required. You must include the following particulars in the footer section of each page of the attached sheets: o Student ID or Student Name o Unit ID or Unit Code o Course ID or Course Code o Trainer and assessor name o Page numbers This is the first (1) unit assessment task you have to successfully complete to be deemed competent in this unit of competency. The Written Assessment is comprised of Six (6) written questions You must respond to all questions and submit them to your Trainer/Assessor. You must answer all questions to the required level, e.g. provide the number of points, to be deemed satisfactory in this task You will receive your feedback within two weeks - you will be notified by your Trainer/Assessor when results are available QUESTIONS: Q1: Answer the following questions: 1.1. Discuss the purpose of The Privacy Amendment (Notifiable Data Breaches) Act 2017 using 30-60 words. Ans. This Act mandates organizations to notify individuals and the OAIC about significant breaches of personal data that may cause harm. 1.2. Explain personally identifiable information (PII) using 30-60 words. Ans. PII is any data that can be used to identify a specific individual, such as name, address, or identification numbers. 1.3. Identify three (3) pieces of workplace-related information that can be constituted as personally identifiable information (PII). Ans. Employee names and job titles. Work email addresses. Employee identification numbers. 1.4. Explain using 30-60 words why securing Personally Identifiable Information (PII) is a critical data protection task? Ans. Securing PII is crucial to protect individuals from identity theft, fraud, and privacy violations, which can have significant personal and financial impacts. 1.5. What are the four (4) specifications related to personally identifiable information (PII). Ans. Consent for collection and processing. Limitation of use and disclosure. Data accuracy and relevance. Secure storage and destruction. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: 1.6. When an organisation or agency must notify affected individuals and the Office of the Australian Information Commissioner (OAIC) according to Notifiable Data Breach legislation and Privacy Act 1988? Answer using 20- 40 words. Ans. Organizations must notify when there is unauthorized access, disclosure, or loss of PII that is likely to result in serious harm. 1.7. Identify five (5) examples of serious harm under the Notifiable Data Breaches scheme? Ans. Identity theft. Financial loss. Threats to personal safety. Loss of business or employment opportunities. Damage to reputation or relationships. 1.8. What are the seven (7) principles of the General Data Protection Regulation (GDPR)? Ans. Lawfulness, fairness, and transparency. Purpose limitation. Data minimization. Accuracy. Storage limitation. Integrity and confidentiality. Accountability. Q2. Answer the following questions: 2.1. Why is it important to store, share and manage information securely? Answer using 30-60 words. Ans. It protects sensitive data from unauthorized access, prevents data breaches, and maintains trust and compliance with legal and ethical standards. 2.2. What are the uses of encryption? Answer using 20-40 words. Ans. Encryption secures data by converting it into a coded form, protecting it during transmission and storage. 2.3. What is the difference between WEP and WPA encryption protocols? Answer using 20-40 words. Ans. WEP is an older, less secure protocol, while WPA is more advanced and provides stronger security measures. 2.4. Explain data classification using 20-40 words. Ans. Categorizing data based on sensitivity and the level of security required. 2.5. What are media labelling and document labelling requirements? Answer using 20-40 words. Ans. Labels indicate the sensitivity and handling requirements of physical and digital media. 2.6. Explain data governance using 30-60 words. Ans. Involves overseeing data management and usage to ensure data quality, compliance, and effective use. 2.7. Discuss acceptable use policy (AUP) using 30-60 words. Ans. Guidelines defining permissible and prohibited activities for users of IT resources. 2.8. What are the three (3) disadvantages of bring-your-own-device (BYOD) processes at a workplace. Ans. Increased security risks. Difficulty in managing diverse devices. Potential for data leakage. Q3: Answer the following questions: 3.1. Identify and explain the purpose of an Australian Government organisation working in cyber security using 30-60 words. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Ans. Organizations like the Australian Cyber Security Centre (ACSC) work to protect national security by countering cyber threats. 3.2. What is the importance of preparing and publishing a threat report on an ongoing basis? Answer using 30- 60 words. Ans. Regular threat reports help in staying updated on emerging threats, facilitating proactive defence strategies. Q4: Answer the following questions: 4.1. How can cyber security be instilled in workplace culture? Answer using 20-40 words. Ans. Through regular training, clear policies, and promoting a security-first mindset among employees. 4.2. Identify five (5) risks associated with workplace cyber security awareness and best practices. Ans. Phishing attacks. Data breaches. Insider threats. Inadequate password practices. Lack of employee awareness. Q5: Answer the following questions: 5.1. How should you promote cyber security in the workplace? Discuss the strategies and techniques to promote cyber security in the workplace using 30-60 words. Ans. Use regular training, simulations, policy enforcement, and awareness campaigns to foster a strong security culture. 5.2. What aspects should be considered when promoting cyber security at a workplace? Identify five (5) aspects. Ans. Regular training and education. Clear security policies. Employee engagement. Regular updates and reminders. Response plan for incidents. Q6: Answer the following questions: 6.1. How do you implement a workplace cyber security awareness program? Explain using 30-60 words. Ans. Incorporate regular training, simulated cyber-attacks, policy updates, and employee feedback mechanisms. 6.2. What is the purpose of cyber security awareness training using simulated activities? Explain using 30-60 words. Ans. They provide practical experience, test employee readiness, and help identify areas for improvement in cyber security practices. Assessor Checklist: Assessment Task 1 (Written Assessment) Questions Satisfactory Q1. Yes No Q2. Yes No Q3. Yes No Q4. Yes No Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Q5. Yes No Q6. Yes No Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Assessment Cover Sheet Please complete cover sheet clearly and accurately for assessment tasks and other types of evidence you submit for your course. All student assessment tasks submissions including any associated checklists where applicable, are to be attached to this cover sheet. Student Use Student ID No Student Name Unit Code BSBXCS402 Unit Title Promote workplace cyber security awareness and best practices Assessment No. 2 Assessment Method Project Initial Submission Re-Submission Student Declaration I declare that: These tasks are my own work. None of this work has been completed by any other person These tasks are not plagiarised or colluded with any other student/s. I have correctly referenced all resources and reference texts throughout these assessment tasks. I have read and understood NTCA’s policy on Plagiarism, cheating and collusion and understand that if I am found to be in breach of this policy, disciplinary action may be taken against me by NTCA. I have a copy of my assessment work with me, which I can produce if the original is lost. Student Signature: Submission Date: Assessor Use Only Outcome Satisfactory / Not Satisfactory Assessor Feedback: Assessor Name: Signature: Date: Student Submission Receipt: Your submission has been received. Please keep a copy of this record. Student ID & Name : ……………………………….…………………….….. Submission Date: …………………..……………………………. Unit Code : ………………………………..……………… Assessment No & Method: ……………………………………..….……..…………. Initial Submission Re-Submission Received By (Name): …………………………………….…. Signature: …………………..……….. Date: …………………..……………….. The results will be updated within twenty-one (21) days from your final submission . Please check your student portal regularly to make sure that your results are updated. If there are any discrepancies, please discuss with the Trainer/Student Support Officer. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Assessment Task 2 - Project Task instructions This is the second (2) assessment task you must successfully complete to be deemed competent in this unit of competency. This assessment task requires you to complete a project. You are required to promote cyber security in a work area in this assessment task. You will receive your feedback within two (2) weeks, and you will be notified by your trainer/assessor when your results are available. You must attempt all activities of the project for your trainer/assessor to assess your competence in this assessment task. Project This assessment task requires you to demonstrate the skills and knowledge to lead the identification, management and implementation of specific industry technologies to meet identified industry standards. You are required to complete the following assessment activities in this assessment task: 1. Develop cyber security awareness in the work area by developing one set of policies and procedures for a work area that promote cyber security awareness and practices 2. Support effective cyber security practices in the work area by arranging training or updates to be provided to colleagues that support practice or awareness in relation to two different cyber security matters 3. Review cyber security awareness in the work area Scenario You have recently joined a training organisation as a cybersecurity officer. The training organisation use several delivery modes such as classroom, blended and distance modes to provide quality education and training to its clients. The training organisation has experienced a number of cyber threats recently including but not limited to: A ransomware attack A number of phishing activities Data leakage on a number of occasions Website hacking (two times in the last month) You are required to develop cyber security awareness in the work area by developing one set of policies and procedures for a work area that promote cyber security awareness and practices, support effective cyber security practices in the work area by arranging training or updates to be provided to colleagues that support practice or awareness in relation to two different cyber security matters and review cyber security awareness in the work area. Problem: The organisation currently does not have the expertise, knowledge, or skills to look into cyber security threats, they will require your services to make sure the organisation is secure and safe from the cyber threats. Other roles and responsibilities Organisational representative/Information security manager: This role will be played by your trainer/assessor. The purpose of this role is to ensure: developing and managing Information Systems cybersecurity, including disaster recovery, database protection and software development. Manages IS security analysts to ensure that all applications are functional and secure. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Workplace colleagues (two): The role can be allocated to RTO representatives assigned by your trainer/assessor or any two students. If the students are selected, the demonstration of activities will occur in small groups in the absence of other students not participating at any given time. All students must participate and demonstrate their skills and knowledge to complete each of the assessment activities. The students will be assessed individually at all times based on their performance in the assessment activities. Activity 1: Develop cyber security awareness in work area by developing one set of policies and procedures for a work area that promote cyber security awareness and practices In this assessment activity, you are required to develop cyber security awareness in the work area by developing one set of policies and procedures for a work area that promote cyber security awareness and practices. To complete this assessment task, you must participate in a meeting to consult with stakeholders to understand the assessment requirements and collect all the necessary information to complete your assessment activities. Meeting objectives: Understand the assessment task requirements Understand your role and responsibilities Understand the role and responsibilities of other team members Understand the organisational requirements and guidelines in which meeting should occur Understand the topics to be discussed Understand any other requirements and guidelines applicable to complete the assessment task The meeting should cover all aspects of performance criteria to complete the assessment task successfully Before the meeting, you are required to prepare a meeting agenda using the template provided. When conducting the meeting, you are required to: Greet the team members. Discuss the following: o Compliance of diversity policy with the legislative requirements o Application of diversity policy. o Assessment of the currency of diversity policy o Assessment of the efficacy of diversity policy o Suggested improvements Ensure the understanding of the team members. Gather feedback from the team members on the diversity policy o Use listening and questioning to elicit the views of others and to clarify or confirm understanding Discuss the roles and responsibilities of the team members. Discuss the implementation plan for the revised diversity policy. Discuss the following: o Key result area o Objectives o Actions/training needs o Responsibility o Timeframe o Success measures Gain approval for the implementation plan The team member will: Clarify their doubts of the team members Provide feedback on the improvements required Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: After the meeting, you are then required to: Prepare the meeting minutes template. Prepare a revised diversity policy using the template provided. Prepare an implementation plan using the template provided. Meeting agenda template: Date/Time: 01 Sep 2023 Location: Classroom Chairperson: Mandeep Kaur Meeting Attendees: Full names and roles Mandeep Kaur, Avtar Singh, Sukhraj Kaur, Gurmeet Singh Agenda Item/Topic Discussion/Outcomes Action Officer Due Date Welcome Greeting and introduction Mandeep Kaur 14 Sep 2023 Compliance with Legislative Requirements Discuss compliance of diversity policy with laws Avtar Singh 14 Sep 2023 Application of Diversity Policy Evaluate the application and effectiveness Sukhraj Kaur 14 Sep 2023 Assessment and Improvement of Diversity Policy Review and suggest improvements Gurmeet Singh 14 Sep 2023 Summary Overall Summary Overview of decisions and actions. Next Meeting time/date 15 Sep 2023 Mandeep Kaur Meeting closed at: 5.00 PM Minutes are a true and accurate record of the meeting Approved/confirmed by whom? Mandeep Kaur Meeting minutes template: Minutes of Meeting Meeting Objective: Discuss the development of cybersecurity awareness and diversity policy in the work area. Attendees: Mandeep Kaur, Avtar Singh, Sukhraj Kaur, Gurmeet Singh Venue: Classroom Date: 01 Sep 2023 Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: No. Points Discussed Actions Suggested Target Date 1 Welcome and Introduction Greet team members and outline meeting objectives 01 Sep 2023 2 Compliance with Legislative Requirements Review current policy compliance 14 Sep 2023 3 Application of Diversity Policy Assess current application and efficacy 14 Sep 2023 Signature of attendee 1: Signature of attendee 2: Mandeep Kaur Avtar Singh Signature of attendee 3: Signature of attendee 4: Sukhraj Kaur Gurmeet Singh Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: You must develop a set of cybersecurity policies and procedures for your training organisation that promote cybersecurity awareness and practices. You must use the template provided below to complete this assessment activity: Intent: To establish robust cybersecurity practices within the organization to protect sensitive information and prevent cyber threats. Scope of the policy: Applicable to all employees, contractors, and stakeholders who interact with the organization's IT infrastructure. Definitions: Define key terms such as "cybersecurity," "ransomware," "phishing," "data leakage," and "PII." Introduction: Outline the importance of cybersecurity in the context of recent cyber threats faced by the organization. Policy principles and procedures (explain in terms of capability, responsibilities, culture, risk management and response and recovery): Capability : Training and resource allocation for cybersecurity. Responsibilities : Defining roles in preventing and responding to cyber incidents. Culture : Fostering a security-aware culture among all staff. Risk Management : Identifying, assessing, and mitigating cyber risks. Response and Recovery : Procedures for responding to and recovering from cyber incidents. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Workplace training review template You must also complete the following workplace training review template to develop the training program for your organisation. Explain how you have established the current level of awareness in work area relating to cybersecurity? (50-100 words) Conduct a survey or assessment to gauge the current level of cybersecurity awareness among staff. Explain how you have completed the policy and procedure to create and maintain cybersecurity awareness program that reflects organisation-wide best practice? (50-100 words) Draft comprehensive policies and procedures that align with best practices and communicate them across the organization. Explain how you have contributed to developing cybersecurity policies and procedures, and communicated to required personnel? (50-100 words) Engage with key stakeholders to develop effective cybersecurity policies, ensuring their communication and understanding among required personnel. Performance Checklist: Activity 1 Your task must address the following performance criteria/ performance checklist. To be assessed as satisfactory (S) in this assessment task, the student needs to demonstrate competency in the following critical aspects of evidence: S N/S Trainer/Assessor to complete (Comment and feedback to students) a) Participation in the meeting and demonstrating skills and knowledge to understand the requirements to complete the assessment task. b) Developed cyber security awareness in work area by developing one set of policies and procedures for a work area that promote cyber security awareness and practices c) Established the current level of awareness in work area relating to cybersecurity d) Completed the policy and procedure to create and maintain cybersecurity awareness program that reflects organisation-wide best practice e) Contributed to developing cybersecurity policies and procedures, and communicated to required personnel Activity 2: Support effective cyber security practices in the work area by arranging training or updates to be provided to colleagues that support practice or awareness in relation to two different cyber security matters In this assessment activity, you are required to arrange training to be provided to colleagues to support practice and awareness in relation to cybersecurity matters. The training will be required for 15 to 30 minutes and must include the following topics: The organisation Review cyber security practices according to organisational policies and procedures Arrange training and information updates as required, and maintain related records Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Cybersecurity training requirements and purpose Phishing attacks. Removable media. Passwords and Authentication. Physical security. Mobile Device Security. Working Remotely. Public Wi-Fi. Cloud Security Present insights from review and training to required personnel, and potential related impacts on the workplace The training should occur in front of your trainer/assessor. The student must complete an MS Powerpoint presentation covering all the mentioned above topics. The presentation should include 10- 20 slides. The copy of the presentation must be submitted with this assessment activity. You must use the template provided below to complete this assessment activity: Cybersecurity training and information session How would you evaluate the training provided? (50-100 words) The training was relevant to the needs and requirements of the audience Materials provided were helpful Length of the training was sufficient and complied The content was well organised Questions were encouraged Instructions were clear and understandable The training met all expectations The topics covered well in the presentation The training was highly effective and aligned well with the needs and requirements of the audience. The materials provided were not only helpful but also insightful for practical application. The duration of the training was apt, ensuring comprehensive coverage without overwhelming the attendees. Content organization was a strong point, facilitating easy understanding and retention of information. The interactive approach, encouraging questions, made the session engaging. Clear and understandable instructions enhanced the learning experience. Overall, the training met all expectations, thoroughly covering the essential topics in cybersecurity, leaving attendees better informed and prepared. How did others evaluate the training provided? (50-100 words) The training was relevant to the needs and requirements of the audience Materials provided were helpful Length of the training was sufficient and complied The content was well organised Questions were encouraged Feedback from other participants indicates a positive reception of the training. Attendees found the training content relevant and tailored to their requirements, appreciating the utility of the provided materials. The length of the training was deemed appropriate, allowing enough time for detailed discussion without causing fatigue. The well-organized content structure facilitated an easier understanding of complex cybersecurity concepts. The encouraging environment for questions led to more interactive and fruitful discussions. Clear instructions enhanced comprehension, making complex cybersecurity topics accessible. Participants felt that the training met their expectations and covered all the key topics effectively, leaving them more knowledgeable and aware of cybersecurity practices and risks. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Instructions were clear and understandable The training met all expectations The topics covered well in the presentation Performance Checklist: Activity 2 Your task must address the following performance criteria/ performance checklist. To be assessed as satisfactory (S) in this assessment task, the student needs to demonstrate competency in the following critical aspects of evidence: S N/S Trainer/Assessor to complete (Comment and feedback to students) a) Plan and develop the presentation for the training session b) All topics covered in the presentation c) The delivery of the presentation meets the evaluation criteria d) Review cyber security practices according to organisational policies and procedures e) Arrange training and information updates as required, and maintain related records f) Present insights from review and training to required personnel, and potential related impacts on the workplace Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Activity 3: Review cybersecurity awareness in the work area In this assessment activity, you are required to review the cyber security threats and trends to ensure your organisation is secure from all cyber threats. You must complete the attached review form to complete this assessment activity successfully. How have you reviewed the latest cybersecurity threats and trends impacting organisations? (Review any three) 1. Ransomware Evolution : Reviewed reports and articles from cybersecurity forums and intelligence platforms to understand the evolution of ransomware attacks, focusing on their increasing sophistication and targeted nature. 2. Phishing Tactics : Analyzed recent phishing incidents within the industry, assessing new methods like social engineering and spear-phishing, through cybersecurity bulletins and incident reports. 3. Data Breaches : Studied case studies of significant data breaches, examining common vulnerabilities and attack vectors, utilizing resources from cybersecurity agencies and databases. Document outcomes of the review and suggested improvements for consideration by required personnel (50-100 words) The review revealed an uptick in sophisticated ransomware and phishing attacks, often exploiting human error or system vulnerabilities. It suggests enhancing employee training on recognizing phishing attempts and reinforcing the importance of regular system updates to mitigate ransomware risks. Additionally, strengthening network security measures and implementing more robust data encryption practices are recommended to prevent data breaches. These findings and suggestions should be considered for integration into our current cybersecurity strategy to bolster our defenses. How have you communicated review outcomes and cybersecurity improvement requirements according to organisational policies and procedures? (50-100 words) The outcomes of the cybersecurity review and the proposed improvement measures were communicated to the relevant personnel through a formal report, followed by a presentation in the management meeting. This approach ensured alignment with the organizational policies for information dissemination and decision-making. The presentation emphasized the urgency of the improvements, backing them with recent trends and incidents. The report was then circulated among department heads and IT staff, ensuring wide awareness, and setting the stage for collaborative implementation of the recommended cybersecurity enhancements. Performance Checklist: Activity 3 Your task must address the following performance criteria/ performance checklist. To be assessed as satisfactory (S) in this assessment task, the student needs to demonstrate competency in the following critical aspects of evidence: S N/S Trainer/Assessor to complete (Comment and feedback to students) a) Review latest cyber security threats and trends impacting organisations   b) Document outcomes of the review and suggested improvements for consideration by required personnel   Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: c) Communicate review outcomes and cyber security improvement requirements according to organisational policies and procedures   Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help