student-assessment-bsbxcs302-1177017-student-49169-dennis-browne

pdf

School

South Metropolitan TAFE *

*We aren’t endorsed by this school

Course

BSBXCS302

Subject

Information Systems

Date

Jun 21, 2024

Type

pdf

Pages

10

Uploaded by CoachBat4210

Report
STUDENT ASSESSMENT Trainer: ERIK EMUILENBURG Student: DENNIS BROWNE Unit: BSBXCS302 - IDENTIFY AND REPORT ONLINE SECURITY THREATS IVET 1
STUDENT AGREEMENT/DECLARATION STUDENT AGREEMENT/DECLARATION Student Name: Dennis Browne PRE AND DURING ASSESSMENT PRE AND DURING ASSESSMENT Prior to and during the assessment processes I am aware of and agree to all of the following. I have read and understood what is required in terms of the assessment tasks that make up this unit Yes No I agree to the way in which I am being assessed Yes No I do not have any special needs or considerations to be made for this assessment. If no, please discuss your needs directly with your Teacher/Assessor Yes No I understand my rights to appeal the decisions made in an assessment Yes No I am aware I will be assessed on my ability to competently address all of the tasks in this unit Yes No I am aware of the due dates of this work as set out by the trainer Yes No I am aware that if assessed as NYC, I will have further opportunities for reassessment as discussed on an individual basis with my trainer Yes No IVET 2
UNIT COMPLETION RECORD UNIT COMPLETION RECORD In the following assessment task, I Erik Emuilenburg have assessed the student to the best of my ability as: Task: BSBXCS302 - Assessment Task 1_Knowledge Questions Satisfactory Not Satisfactory Student Name: Dennis Browne Unit completion date: 05-06-2024 After the student has completed assessments, this unit completion record and feedback unit completion record and feedback needs to be completed and declared by the student and assessor. If the student’s work is not satisfactory at the first attempt, strategies to address gaps in performance need to be identified and time for reassessment arranged. IVET 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ASSESSMENT FEEDBACK AND RESULTS SHEET ASSESSMENT FEEDBACK AND RESULTS SHEET For this unit assessment, I Erik Emuilenburg have assessed the student to the best of my ability as: Satisfactory Not Satisfactory Strategies for further improvement and overall feedback: Congratulations on successful completion of this unit. You have been deemed competent through satisfactorily completing all set assessment tasks. I Dennis Browne Dennis Browne declare that these tasks are my own work. None of this work has been completed by any other person. I have not cheated or plagiarised the work or colluded with any other student/s. I have correctly referenced all resources and reference texts throughout these assessment tasks. I understand that if I am found to be in breach of policy, disciplinary action may be taken against me. I have acknowledged that I have read and understood the unit result given by my teacher / assessor I have received feedback from my trainer assessor Student Name: Dennis Browne Assessor Name: Erik Emuilenburg Date: 05-06-2024 IVET 4
ASSESSMENT EVIDENCE ASSESSMENT EVIDENCE 1. Complete the table below giving a brief overview of the legislative requirements in identifying and reporting online security threats: Element Requirements Data protection Notifiable Data Breach legislation Established international legislation Data Protection: Data Protection: * Data should be confidential,Avaliable and have integrity and the organisation should strive to confidenialise data. Notifiable Data Breach legislation: Notifiable Data Breach legislation: * The organisation must take immediate action to mitigate the risks and notify the affected individuals and the OAIC Established international legislation: Established international legislation: * 67 countries except Russia, Brazil and India cooperate to criminalise anyone who commits cybercrime Resubmission Resubmission Assessment feedback 1: Please arrange a time with me to seek clarification of the requirements of this task or question prior to resubmission. INCORRECT Erik Emuilenburg 17-05-2024 IVET 5
Data Protection: Data Protection: * The cyber crime act of 2001. Key offences are unauthorised access, modification of data. Notifiable Data Breach legislation: Notifiable Data Breach legislation: * The cyber crime act of 2001. Key offences are unauthorised access, modification of data. Established international legislation: Established international legislation: * Council of Europe convention of cybercrime, it requires party to criminalise conduct. It has got investigative powers that cooperate in broadest sense possible on cyber crime investigations Assessment feedback 2: Well done. You have clearly demonstrated your knowledge through the completion of this task or question. CORRECT Erik Emuilenburg 05-06-2024 2. What should you do if you receive a phishing email? Notify the IT department Do not click any links Notify anyone who is in charge Assessment feedback: Well done. You have clearly demonstrated your knowledge through the completion of this task or question. CORRECT IVET 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3. What should you do if you notice that additional phishing emails start to arrive in your inbox? Isolate them Do not reply Delete it Report as junk Assessment feedback: Well done. Your response to this task confirms your knowledge and shows you have a good understanding of the unit and its content. CORRECT 4. Complete the table below and give an example in each of the situations outlining how you might be exposed to cyber security threats: Phishing Social engineering Social media Malware Physical threats – such as device stolen, or data loss. IVET 7
Phishing: Phishing: * Someone impersonating a well known company Social engineering: Social engineering: * Downloading something where it can gain control over system Social media: Social media: * A link sent from a hacked account of someone you know Malware: Malware: * Downloading a link from unsecured website which infects your device Physical threats – such as device stolen, or data loss: Physical threats – such as device stolen, or data loss: * Not putting a password on computer and leaving it unattended Resubmission Resubmission Assessment feedback 1: Please arrange a time with me to seek clarification of the requirements of this task or question prior to resubmission. INCORRECT Erik Emuilenburg 17-05-2024 IVET 8
Phishing: Phishing: * A suspicious email or link posing as a well known company Social engineering: Social engineering: * A direct offer from a stranger making an offer Social media: Social media: * Somebody impersonating you to hack your account Malware: Malware: * Trying to download illegal software Physical threats – such as device stolen, or data loss: Physical threats – such as device stolen, or data loss: * Leaving your phone on the train Assessment feedback 2: Well done. Your response or submission has sufficiently addressed all requirements of the question or task. CORRECT Erik Emuilenburg 05-06-2024 5. Give two (2) examples of how an attacker might use spam email and SMS texts to phish or spear phish for information. 1. A large amount of emails and sms are sent impersonating a well known organisation 2. Someone could be impersonating a friend or a family member and send email and sms to gain information Assessment feedback: Well done. Your work has been completed to the required standard and is considered satisfactory completion of this question or task. CORRECT 6. How do you detect whether a website is secure? If the URL begins with HTTPS Assessment feedback: Well done. You have clearly demonstrated your knowledge through the completion of this task or question. CORRECT 7. List two (2) places you could find information on cyber security from the Australian Government. https://www.homeaffairs.gov.au/ https://www.afp.gov.au/what-we-do/crime-types/cyber-crime Assessment feedback: Well done. Your response or submission has sufficiently addressed all requirements of the question or task. CORRECT IVET 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8. What are the five (5) basic principles of cyber security? Govern Protect Detect Respond Maturity modelling Assessment feedback: Well done. Your response to this task confirms your knowledge and shows you have a good understanding of the unit and its content. CORRECT 9. What are two (2) common online security threats you might be exposed to by attackers? Malware Phishing Assessment feedback: Well done. Your submission or response has satisfied all criteria for the question or task. CORRECT IVET 10