BSBXCS402 - Student Assessment Pack(1)

.docx

School

Victoria University *

*We aren’t endorsed by this school

Course

BSBXCS402

Subject

Civil Engineering

Date

Apr 3, 2024

Type

docx

Pages

18

Uploaded by DeaconResolve13469

Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Unit Result Sheet This form is to be completed by the assessor and is used to record the student assessment Outcome/result for each Unit of Competency. All student submissions (Outlined below) are to be attached to this sheet before placing on the student academic file. Student results are not to be entered into the Student database unless all relevant paperwork is completed and attached to this sheet. Students must complete all assessment tasks as satisfactory (S) to be Competent (C) Student Use Student ID No NTCA230483 Student Name Mandeep Kaur Unit Code BSBXCS402 Unit Ti t le Promote workplace cyber security awareness and best practices A s s es s or U s e O n l y Initial Submission Re-Submission Please attach the following documentation to this sheet Assessment Outcome Re Assessment Outcome Assessment 1 Written Assessment S NS NA S NS NA Assessment 2 Project S NS NA S NS NA Final Assessment Result for this uni t: C / NYC Comments: A s s ess o r : I declare that I have conducted a f air , valid, reliable and flexible assessment with t his student, and I have provided appropriate f eedback. Assessor Name: Signature: Date: Student Declaration: I declare that I have been assessed in this unit, and I have been advised of my result. I am also aware of my appeal rights. Name: Mandeep Kaur Signature Mandeep Kaur Date: Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: BSBXCS402 Promote workplace cyber security awareness and best practices Assessment Tool Assessment Resource Summary Assessment Type This is a summative assessment, which requires the assessment to be conducted in conditions that are safe and replicate the workplace Assessment Tasks Assessment Task 1: Written questions Assessment Task 2: Project Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Assessment Cover Sheet Please complete cover sheet clearly and accurately for assessment tasks and other types of evidence you submit for your course. All student assessment tasks submissions including any associated checklists where applicable, are to be attached to this cover sheet. Student Use Student ID No NTCA230483 Student Name Mandeep Kaur Unit Code BSBXCS402 Unit Title Promote workplace cyber security awareness and best practices Assessment No. 1 Assessment Method Written Assessment Initial Submission Re-Submission Student Declaration I declare that: These tasks are my own work. None of this work has been completed by any other person These tasks are not plagiarised or colluded with any other student/s. I have correctly referenced all resources and reference texts throughout these assessment tasks. I have read and understood NTCA’s policy on Plagiarism, cheating and collusion and understand that if I am found to be in breach of this policy, disciplinary action may be taken against me by NTCA. I have a copy of my assessment work with me, which I can produce if the original is lost. Student Signature: Mandeep Kaur Submission Date: Assessor Use Only Outcome Satisfactory / Not Satisfactory Assessor Feedback: Assessor Name: Signature: Date: Student Submission Receipt: Your submission has been received. Please keep a copy of this record. Student ID & Name : ……………………………….…………………….….. Submission Date: …………………..……………………………. Unit Code : ………………………………..……………… Assessment No & Method: ……………………………………..….……..…………. Initial Submission Re-Submission Received By (Name): …………………………………….…. Signature: …………………..……….. Date: …………………..……………….. The results will be updated within twenty-one (21) days from your final submission . Please check your student portal regularly to make sure that your results are updated. If there are any discrepancies, please discuss with the Trainer/Student Support Officer. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Assessment Task 1: Written Assessment Task instructions This is an individual assessment. The purpose of this assessment task is to assess the students’ knowledge essential to work and communicate effectively in an ICT environment in a range of contexts and industry settings. To make full and satisfactory responses you should consult a range of learning resources, other information such as handouts and textbooks, learners’ resources and slides. All questions must be answered in order to gain competency for this assessment. You may attach a separate sheet if required. You must include the following particulars in the footer section of each page of the attached sheets: o Student ID or Student Name o Unit ID or Unit Code o Course ID or Course Code o Trainer and assessor name o Page numbers This is the first (1) unit assessment task you have to successfully complete to be deemed competent in this unit of competency. The Written Assessment is comprised of Six (6) written questions You must respond to all questions and submit them to your Trainer/Assessor. You must answer all questions to the required level, e.g. provide the number of points, to be deemed satisfactory in this task You will receive your feedback within two weeks - you will be notified by your Trainer/Assessor when results are available QUESTIONS: Q1: Answer the following questions: 1.1. Discuss the purpose of The Privacy Amendment (Notifiable Data Breaches) Act 2017 using 30-60 words. Ans. This Act mandates organizations to notify individuals and the OAIC about significant breaches of personal data that may cause harm. 1.2. Explain personally identifiable information (PII) using 30-60 words. Ans. PII is any data that can be used to identify a specific individual, such as name, address, or identification numbers. 1.3. Identify three (3) pieces of workplace-related information that can be constituted as personally identifiable information (PII). Ans. Employee names and job titles. Work email addresses. Employee identification numbers. 1.4. Explain using 30-60 words why securing Personally Identifiable Information (PII) is a critical data protection task? Ans. Securing PII is crucial to protect individuals from identity theft, fraud, and privacy violations, which can have significant personal and financial impacts. 1.5. What are the four (4) specifications related to personally identifiable information (PII). Ans. Consent for collection and processing. Limitation of use and disclosure. Data accuracy and relevance. Secure storage and destruction. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: 1.6. When an organisation or agency must notify affected individuals and the Office of the Australian Information Commissioner (OAIC) according to Notifiable Data Breach legislation and Privacy Act 1988? Answer using 20- 40 words. Ans. Organizations must notify when there is unauthorized access, disclosure, or loss of PII that is likely to result in serious harm. 1.7. Identify five (5) examples of serious harm under the Notifiable Data Breaches scheme? Ans. Identity theft. Financial loss. Threats to personal safety. Loss of business or employment opportunities. Damage to reputation or relationships. 1.8. What are the seven (7) principles of the General Data Protection Regulation (GDPR)? Ans. Lawfulness, fairness, and transparency. Purpose limitation. Data minimization. Accuracy. Storage limitation. Integrity and confidentiality. Accountability. Q2. Answer the following questions: 2.1. Why is it important to store, share and manage information securely? Answer using 30-60 words. Ans. It protects sensitive data from unauthorized access, prevents data breaches, and maintains trust and compliance with legal and ethical standards. 2.2. What are the uses of encryption? Answer using 20-40 words. Ans. Encryption secures data by converting it into a coded form, protecting it during transmission and storage. 2.3. What is the difference between WEP and WPA encryption protocols? Answer using 20-40 words. Ans. WEP is an older, less secure protocol, while WPA is more advanced and provides stronger security measures. 2.4. Explain data classification using 20-40 words. Ans. Categorizing data based on sensitivity and the level of security required. 2.5. What are media labelling and document labelling requirements? Answer using 20-40 words. Ans. Labels indicate the sensitivity and handling requirements of physical and digital media. 2.6. Explain data governance using 30-60 words. Ans. Involves overseeing data management and usage to ensure data quality, compliance, and effective use. 2.7. Discuss acceptable use policy (AUP) using 30-60 words. Ans. Guidelines defining permissible and prohibited activities for users of IT resources. 2.8. What are the three (3) disadvantages of bring-your-own-device (BYOD) processes at a workplace. Ans. Increased security risks. Difficulty in managing diverse devices. Potential for data leakage. Q3: Answer the following questions: 3.1. Identify and explain the purpose of an Australian Government organisation working in cyber security using 30-60 words. Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Level 11, 190 Queen St, Melbourne, 3000 Tel: 03 9606 0032 | Web: Ans. Organizations like the Australian Cyber Security Centre (ACSC) work to protect national security by countering cyber threats. 3.2. What is the importance of preparing and publishing a threat report on an ongoing basis? Answer using 30- 60 words. Ans. Regular threat reports help in staying updated on emerging threats, facilitating proactive defence strategies. Q4: Answer the following questions: 4.1. How can cyber security be instilled in workplace culture? Answer using 20-40 words. Ans. Through regular training, clear policies, and promoting a security-first mindset among employees. 4.2. Identify five (5) risks associated with workplace cyber security awareness and best practices. Ans. Phishing attacks. Data breaches. Insider threats. Inadequate password practices. Lack of employee awareness. Q5: Answer the following questions: 5.1. How should you promote cyber security in the workplace? Discuss the strategies and techniques to promote cyber security in the workplace using 30-60 words. Ans. Use regular training, simulations, policy enforcement, and awareness campaigns to foster a strong security culture. 5.2. What aspects should be considered when promoting cyber security at a workplace? Identify five (5) aspects. Ans. Regular training and education. Clear security policies. Employee engagement. Regular updates and reminders. Response plan for incidents. Q6: Answer the following questions: 6.1. How do you implement a workplace cyber security awareness program? Explain using 30-60 words. Ans. Incorporate regular training, simulated cyber-attacks, policy updates, and employee feedback mechanisms. 6.2. What is the purpose of cyber security awareness training using simulated activities? Explain using 30-60 words. Ans. They provide practical experience, test employee readiness, and help identify areas for improvement in cyber security practices. Assessor Checklist: Assessment Task 1 (Written Assessment) Questions Satisfactory Q1. Yes No Q2. Yes No Q3. Yes No Q4. Yes No Document: BSBXCS402 - Student Assessment Pack | Version: 1.1 | Page 1 of 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help