VU21990_AE_Pro_1of3

docx

School

TAFE NSW - Sydney Institute *

*We aren’t endorsed by this school

Course

22334VIC

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

10

Uploaded by MegaIceFlamingo6004

Report
Project assessment: Cyber security service proposal Criteria Unit code, name and release number VU21990 Recognise the need for cyber security in an organisation Qualification/Course code, name and release number 22334VIC Certificate IV in Cyber Security Student details Student number Student name Assessment Declaration This assessment is my original work and no part of it has been copied from any other source except where due acknowledgement is made. No part of this assessment has been written for me by any other person except where such collaboration has been authorised by the assessor concerned. I understand that plagiarism is the presentation of the work, idea or creation of another person as though it is your own. Plagiarism occurs when the origin of the material used is not appropriately cited. No part of this assessment is plagiarised. Student signature and Date Document title: VU21990_AE_Pro_1of3 Page 1 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Version: 1.0 Date created: 18 December 2018 Date modified: 15 January 2019 For queries, please contact: Technology and Business Services SkillsPoint Ultimo © 2018 TAFE NSW, Sydney RTO Provider Number 90003 | CRICOS Provider Code: 00591E This assessment can be found in the: Learning Bank The contents in this document is copyright © TAFE NSW 2018, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 5 July 2019. For current information please refer to our website or your teacher as appropriate. Document title: VU21990_AE_Pro_1of3 Page 2 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Assessment instructions Table 1 Assessment instructions Assessment details Instructions Assessment overview The objective of this assessment is to assess your knowledge and performance to define a cyber security framework for an organisation and identify the need for cyber security. Assessment Event number 1 of 3 Instructions for this assessment This is a project-based assessment and will be assessing you on your knowledge and performance of the unit. This assessment is in two parts and includes an Assessment feedback form: 1. Service proposal report 2. Assessment checklist. 3. Assessment feedback Submission instructions On completion of this assessment, you are required to upload it or hand it to your assessor for marking. Save your files with the event name and your own name, for example: Event1_john_smith . Ensure you have written your name at the bottom of each page of your assessment. Submit the following documents for each part: Part 1 o Cyber security service proposal report. It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment. Check Assessment checklist to ensure that you’ve covered all the required tasks. What do I need to do to achieve a satisfactory To achieve a satisfactory result for this assessment all questions must Document title: VU21990_AE_Pro_1of3 Page 3 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
result? be answered correctly. What do I need to provide? USB drive or other storage method to save work to A personal computer with internet access What will the assessor provide? Access to the Learning Management System Scenario documents as outlined in assessment. Due date and time allowed Indicative timeline to complete: Part 1: 2 hours Assessment feedback, review or appeals Appeals are addressed in accordance with Every Student’s Guide to Assessment. Document title: VU21990_AE_Pro_1of3 Page 4 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Specific task instructions You are required to write a cyber security service proposal based on this scenario . Part 1: Service proposal report Using the DataTrust report template , write a cyber security service proposal based on the scenario (less than 50 words). Your report must address the following headings and content: 1. Introduction Outline the concept of information security and why it’s important to care about it, by addressing the following: 1. Definition : Write a definition of information security. Protection of the information and data from unauthorized use or harm Cybersecurity is the ongoing effort to protect the networked systems and all of the data from unauthorized use or harm. 2. Protecting identity and data : Explain the importance of protecting your personal online identity and data. o Protects your online medical record, photos, online credentials and identity from attackers for gaining long term profits, medical benefits, filing a fake tax return, opening credit card account, obtaining loan. Protecting organisational data : Explain the importance of protecting the organisation's data. By protecting the organizations data the organization is safe from ruined reputation, vandalism, theft, revenue loss, damaged intellectual property. 3. Cyber security professionals : Explain why cyber security professionals are necessary. o Because cyber security professionals are vital in today’s business world. They help develop new ways to combat cyber threats, and are the main line of defense against spamming, phishing, malware, viruses and other information security threats. 2. Threats Explain what cyber threats are and list potential threat sources, as follows: 1. Cyber threats : Define the concept of cyber threat. Cyber threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks and other attack vectors. Document title: VU21990_AE_Pro_1of3 Page 5 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
2. Organisational threats : List and describe at least three potential threat sources for an organisation. 1. The Inside Man 2. Ransomware 3. Uneven Cybersecurity Protections 4. Unpatched Security Vulnerabilities/Bugs 3. Risks Explain the concept of risk, as follows: 1. Relationships, risks, and strategies : Identify and discuss: o the relationship between data, networks, users and applications within an organisation. Data, networks, users and applications have relationships. A user processes the data using the application programs and sends it through a network for use by the other end user. Users either can process the data by using applications programs or receive the processed or non processed data through the network. Therefore, one is dependent on the other. If there is no user, data can not be processed and received for use. and a network would be useless. o meaning of risk and risk mitigation Data, user, application and networks can be accessed by attackers or unauthorised intruders either to steal the data or disrupt the system or make it unavailable for use. This will disrupt the work and operations of an organization or individuals. Therefore, data, networks, applications and users are at risk of attack or loss of their information infrastructure. Thus risk mitigation by using cyber security processes and policy and awareness will mitigate such risk. 2. Physical security : Describe the security of physical infrastructure, such as computers in an office building or at your workplace if any: (if you can’t get information about any office building or workplace then consider general physical security) o the threats and risks to these resources o the mitigation strategies that could be implemented Document title: VU21990_AE_Pro_1of3 Page 6 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
3. Identity and access management : Describe: o identity and access management (IAM) systems o how these systems work, for example, lock and key analogy o why it's important to have these in place Document title: VU21990_AE_Pro_1of3 Page 7 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Part 2: Assessment checklist The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions if appropriate directly after the task/activity has been submitted/completed. TASK/STEP # Instructions S U/S Assessor Comments Part 1.1 Report is submitted as a typed document in the supplied DataTrust report template . Writes a definition of information security. Gives appropriate reasons to protect personal online identity and data. Gives appropriate reasons to protect an organisation’s data. Gives appropriate reasons for the need of cyber security professionals. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.2 Writes a definition of the concept of cyber threat. Describes three potential threat sources for an organisation. Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Part 1.3 Describes the risks and relationship between data, networks, users and applications within an organisation. Identifies and evaluates the security of an organisation’s physical infrastructure. Writes an overview of identity and access management (IAM) systems, including their Date of Observation: Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria. Document title: VU21990_AE_Pro_1of3 Page 8 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
importance and how they work. Document title: VU21990_AE_Pro_1of3 Page 9 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assessment feedback NOTE: This section must have the assessor signature and student signature to complete the feedback. Assessment outcome Satisfactory Unsatisfactory Assessor feedback Was the assessment event successfully completed? If no, was the resubmission/re-assessment successfully completed? Was reasonable adjustment in place for this assessment event? If yes, ensure it is detailed on the assessment document. Comments: Assessor name, signature and date: Student acknowledgement of assessment outcome Would you like to make any comments about this assessment? Student name, signature and date NOTE: Make sure you have written your name at the bottom of each page of your submission before attaching the cover sheet and submitting to your assessor for marking. Document title: VU21990_AE_Pro_1of3 Page 10 of 10 Resource ID: TBS_18_028_VU21990_AE_Pro_1of3 STUDENT NAME: