student-assessment-bsbxcs302-1177017-student-49169-dennis-browne
pdf
keyboard_arrow_up
School
South Metropolitan TAFE *
*We aren’t endorsed by this school
Course
BSBXCS302
Subject
Information Systems
Date
Jun 21, 2024
Type
Pages
10
Uploaded by CoachBat4210
STUDENT ASSESSMENT
Trainer:
ERIK EMUILENBURG
Student:
DENNIS BROWNE
Unit:
BSBXCS302 - IDENTIFY AND REPORT ONLINE SECURITY THREATS
IVET
1
STUDENT AGREEMENT/DECLARATION
STUDENT AGREEMENT/DECLARATION
Student Name: Dennis Browne
PRE AND DURING ASSESSMENT
PRE AND DURING ASSESSMENT
Prior to and during the assessment processes I am aware of and agree to all of the following.
I have read and understood what is required in terms of the assessment tasks that make up this unit
Yes
No
I agree to the way in which I am being assessed
Yes
No
I do not have any special needs or considerations to be made for this assessment. If no, please discuss your needs
directly with your Teacher/Assessor
Yes
No
I understand my rights to appeal the decisions made in an assessment
Yes
No
I am aware I will be assessed on my ability to competently address all of the tasks in this unit
Yes
No
I am aware of the due dates of this work as set out by the trainer
Yes
No
I am aware that if assessed as NYC, I will have further opportunities for reassessment as discussed on an individual basis
with my trainer
Yes
No
IVET
2
UNIT COMPLETION RECORD
UNIT COMPLETION RECORD
In the following assessment task, I Erik Emuilenburg have assessed the student to the best of my ability as:
Task: BSBXCS302 - Assessment Task 1_Knowledge Questions
Satisfactory
Not Satisfactory
Student Name: Dennis Browne
Unit completion date: 05-06-2024
After the student has completed assessments, this unit completion record and feedback
unit completion record and feedback needs to be completed and declared by the student and
assessor. If the student’s work is not satisfactory at the first attempt, strategies to address gaps in performance need to be identified and time for
reassessment arranged.
IVET
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
ASSESSMENT FEEDBACK AND RESULTS SHEET
ASSESSMENT FEEDBACK AND RESULTS SHEET
For this unit assessment, I Erik Emuilenburg have assessed the student to the best of my ability as:
Satisfactory
Not Satisfactory
Strategies for further improvement and overall feedback:
Congratulations on successful completion of this unit. You have been deemed competent through satisfactorily completing all set assessment
tasks.
I Dennis Browne
Dennis Browne declare that these tasks are my own work.
None of this work has been completed by any other person.
I have not cheated or plagiarised the work or colluded with any other student/s.
I have correctly referenced all resources and reference texts throughout these assessment tasks.
I understand that if I am found to be in breach of policy, disciplinary action may be taken against me.
I have acknowledged that I have read and understood the unit result given by my teacher / assessor
I have received feedback from my trainer assessor
Student Name: Dennis Browne
Assessor Name: Erik Emuilenburg
Date: 05-06-2024
IVET
4
ASSESSMENT EVIDENCE
ASSESSMENT EVIDENCE
1.
Complete the table below giving a brief overview of the legislative requirements in identifying and
reporting online security threats:
Element
Requirements
Data protection
Notifiable Data Breach legislation
Established international
legislation
Data Protection: Data Protection: *
Data should be confidential,Avaliable and have integrity and the organisation should strive to confidenialise data.
Notifiable Data Breach legislation: Notifiable Data Breach legislation: *
The organisation must take immediate action to mitigate the risks and notify the affected individuals and the OAIC
Established international legislation: Established international legislation: *
67 countries except Russia, Brazil and India cooperate to criminalise anyone who commits cybercrime
Resubmission
Resubmission
Assessment feedback 1:
Please arrange a time with me to seek clarification of the requirements of this task or question prior to resubmission.
INCORRECT
Erik
Emuilenburg
17-05-2024
IVET
5
Data Protection: Data Protection: *
The cyber crime act of 2001. Key offences are unauthorised access, modification of data.
Notifiable Data Breach legislation: Notifiable Data Breach legislation: *
The cyber crime act of 2001. Key offences are unauthorised access, modification of data.
Established international legislation: Established international legislation: *
Council of Europe convention of cybercrime, it requires party to criminalise conduct. It has got investigative powers that cooperate in broadest sense possible on cyber crime investigations
Assessment feedback 2:
Well done. You have clearly demonstrated your knowledge through the completion of this task or question.
CORRECT
Erik
Emuilenburg
05-06-2024
2.
What should you do if you receive a phishing email?
Notify the IT department Do not click any links Notify anyone who is in charge Assessment feedback:
Well done. You have clearly demonstrated your knowledge through the completion of this task or question.
CORRECT
IVET
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.
What should you do if you notice that additional phishing emails start to arrive in your inbox?
Isolate them Do not reply Delete it Report as junk Assessment feedback:
Well done. Your response to this task confirms your knowledge and shows you have a good understanding of the unit and its
content.
CORRECT
4.
Complete the table below and give an example in each of the situations outlining how you might be
exposed to cyber security threats:
Phishing
Social engineering
Social media
Malware
Physical threats – such as device
stolen, or data loss.
IVET
7
Phishing: Phishing: *
Someone impersonating a well known company
Social engineering: Social engineering: *
Downloading something where it can gain control over system
Social media: Social media: *
A link sent from a hacked account of someone you know
Malware: Malware: *
Downloading a link from unsecured website which infects your device
Physical threats – such as device stolen, or data loss: Physical threats – such as device stolen, or data loss: *
Not putting a password on computer and leaving it unattended
Resubmission
Resubmission
Assessment feedback 1:
Please arrange a time with me to seek clarification of the requirements of this task or question prior to resubmission.
INCORRECT
Erik
Emuilenburg
17-05-2024
IVET
8
Phishing: Phishing: *
A suspicious email or link posing as a well known company
Social engineering: Social engineering: *
A direct offer from a stranger making an offer
Social media: Social media: *
Somebody impersonating you to hack your account
Malware: Malware: *
Trying to download illegal software
Physical threats – such as device stolen, or data loss: Physical threats – such as device stolen, or data loss: *
Leaving your phone on the train
Assessment feedback 2:
Well done. Your response or submission has sufficiently addressed all requirements of the question or task.
CORRECT
Erik
Emuilenburg
05-06-2024
5.
Give two (2) examples of how an attacker might use spam email and SMS texts to phish or spear phish for information.
1. A large amount of emails and sms are sent impersonating a well known organisation 2. Someone could be impersonating a friend or a family member and send email and sms to gain information Assessment feedback:
Well done. Your work has been completed to the required standard and is considered satisfactory completion of this question
or task.
CORRECT
6.
How do you detect whether a website is secure?
If the URL begins with HTTPS Assessment feedback:
Well done. You have clearly demonstrated your knowledge through the completion of this task or question.
CORRECT
7.
List two (2) places you could find information on cyber security from the Australian Government.
https://www.homeaffairs.gov.au/
https://www.afp.gov.au/what-we-do/crime-types/cyber-crime
Assessment feedback:
Well done. Your response or submission has sufficiently addressed all requirements of the question or task.
CORRECT
IVET
9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8.
What are the five (5) basic principles of cyber security?
Govern Protect Detect Respond Maturity modelling Assessment feedback:
Well done. Your response to this task confirms your knowledge and shows you have a good understanding of the unit and its
content.
CORRECT
9.
What are two (2) common online security threats you might be exposed to by attackers?
Malware
Phishing Assessment feedback:
Well done. Your submission or response has satisfied all criteria for the question or task.
CORRECT
IVET
10