VU21990_AE_Pro_1of3
docx
keyboard_arrow_up
School
TAFE NSW - Sydney Institute *
*We aren’t endorsed by this school
Course
22334VIC
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
10
Uploaded by MegaIceFlamingo6004
Project assessment: Cyber security service proposal
Criteria
Unit code, name and release number
VU21990 Recognise the need for cyber security in an organisation
Qualification/Course code, name and release number
22334VIC Certificate IV in Cyber Security
Student details
Student number
Student name
Assessment Declaration
●
This assessment is my original work and no part of it has been copied from any other source except where due acknowledgement is made.
●
No part of this assessment has been written for me by any other person except where such collaboration has been authorised by the assessor concerned.
●
I understand that plagiarism is the presentation of the work, idea or creation of another person as though it is your own. Plagiarism occurs when the origin of the material used is not
appropriately cited. No part of this assessment is plagiarised.
Student signature and Date
Document title: VU21990_AE_Pro_1of3
Page 1
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Version:
1.0
Date created:
18 December 2018
Date modified:
15 January 2019
For queries, please contact:
Technology and Business Services SkillsPoint
Ultimo
© 2018 TAFE NSW, Sydney
RTO Provider Number 90003 | CRICOS Provider Code: 00591E
This assessment can be found in the: Learning Bank
The contents in this document is copyright © TAFE NSW 2018, and should not be reproduced without the permission of the TAFE NSW. Information contained in this document is correct at time of printing: 5 July 2019. For current information please refer to our website or your teacher as appropriate.
Document title: VU21990_AE_Pro_1of3
Page 2
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Assessment instructions
Table 1 Assessment instructions
Assessment details
Instructions
Assessment overview
The objective of this assessment is to assess your knowledge and performance to define a cyber security framework for an organisation and identify the need for cyber security.
Assessment Event number
1 of 3
Instructions for this assessment
This is a project-based assessment and will be assessing you on your knowledge and performance of the unit.
This assessment is in two parts and includes an Assessment feedback form:
1.
Service proposal report
2.
Assessment checklist.
3.
Assessment feedback
Submission instructions
On completion of this assessment, you are required to upload it or hand
it to your assessor for marking. Save your files with the event name and your own name, for example: Event1_john_smith
.
Ensure you have written your name at the bottom of each page of your assessment.
Submit the following documents for each part:
●
Part 1
o
Cyber security service proposal report.
It is important that you keep a copy of all electronic and hardcopy assessments submitted to TAFE and complete the assessment declaration when submitting the assessment.
Check Assessment checklist to ensure that you’ve covered all the required tasks.
What do I need to do to
achieve a satisfactory To achieve a satisfactory result for this assessment all questions must Document title: VU21990_AE_Pro_1of3
Page 3
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
result?
be answered correctly.
What do I need to provide?
●
USB drive or other storage method to save work to
●
A personal computer with internet access
What will the assessor provide?
●
Access to the Learning Management System
●
Scenario documents as outlined in assessment.
Due date and time allowed
Indicative timeline to complete:
Part 1: 2 hours
Assessment feedback, review or appeals
Appeals are addressed in accordance with Every Student’s Guide to Assessment.
Document title: VU21990_AE_Pro_1of3
Page 4
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Specific task instructions
You are required to write a cyber security service proposal based on this scenario
.
Part 1: Service proposal report
Using the DataTrust report template
, write a cyber security service proposal based on the scenario (less than 50 words).
Your report must address the following headings and content:
1. Introduction
Outline the concept of information security and why it’s important to care about it, by addressing the
following:
1.
Definition
: Write a definition of information security.
●
Protection of the information and data from unauthorized use or harm
●
Cybersecurity is the ongoing effort to protect the networked systems and all of the data from unauthorized use or harm.
2.
Protecting identity and data
: Explain the importance of protecting your personal online identity and data. o
Protects your online medical record, photos, online credentials and identity from attackers for gaining long term profits, medical benefits, filing a fake tax return, opening credit card account, obtaining loan. Protecting organisational data
: Explain the importance of protecting the organisation's data. ●
By protecting the organizations data the organization is safe from ruined reputation, vandalism, theft, revenue loss, damaged intellectual property. 3.
Cyber security professionals
: Explain why cyber security professionals are necessary.
o
Because cyber security professionals are vital in today’s business world. They help develop new ways to combat cyber threats, and are the main line of defense against spamming, phishing, malware, viruses and other information security threats.
2. Threats
Explain what cyber threats are and list potential threat sources, as follows:
1.
Cyber threats
: Define the concept of cyber threat. Cyber threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks and other attack vectors.
Document title: VU21990_AE_Pro_1of3
Page 5
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
2.
Organisational threats
: List and describe at least three potential threat sources for an organisation.
1.
The Inside Man
2.
Ransomware
3.
Uneven Cybersecurity Protections
4.
Unpatched Security Vulnerabilities/Bugs
3. Risks
Explain the concept of risk, as follows:
1.
Relationships, risks, and strategies
: Identify and discuss: o
the relationship between data, networks, users and applications within an organisation.
Data, networks, users and applications have relationships. A user processes the data using the application programs and sends it through a network for use by the other end user. Users either can process the data by using applications programs or receive the processed or non processed data through the network. Therefore, one is dependent on the other. If there is no user, data can not be processed and received for use. and a network would be useless. o
meaning of risk and risk mitigation
Data, user, application and networks can be accessed by attackers or unauthorised intruders either to steal the data or disrupt the system or make
it unavailable for use. This will disrupt the work and operations of an organization or individuals. Therefore, data, networks, applications and users
are at risk of attack or loss of their information infrastructure. Thus risk mitigation by using cyber security processes and policy and awareness will mitigate such risk. 2.
Physical security
: Describe the security of physical infrastructure, such as computers in an office building or at your workplace if any: (if you can’t get information about any office building or workplace then consider general physical security)
o
the threats and risks to these resources
o
the mitigation strategies that could be implemented Document title: VU21990_AE_Pro_1of3
Page 6
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3.
Identity and access management
: Describe:
o
identity and access management (IAM) systems
o
how these systems work, for example, lock and key analogy
o
why it's important to have these in place
Document title: VU21990_AE_Pro_1of3
Page 7
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Part 2: Assessment checklist
The following checklist will be used by your assessor to mark your performance against the assessment criteria of your submitted project. Use this checklist to understand what skills and/or knowledge you need to demonstrate in your submission. All the criteria described in the Assessment Checklist must be met. The assessor may ask questions if appropriate directly after the task/activity has been submitted/completed.
TASK/STEP #
Instructions
S
U/S
Assessor Comments
Part 1.1
Report is submitted as a typed document in the supplied DataTrust report template
.
Writes a definition of information security.
Gives appropriate reasons to protect personal online identity and data.
Gives appropriate reasons to protect an organisation’s data.
Gives appropriate reasons for the need of cyber security professionals.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.2
Writes a definition of the concept of cyber threat. Describes three potential threat sources for an organisation.
Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Part 1.3
Describes the risks and relationship between data, networks, users and applications within an organisation.
Identifies and evaluates the security of an
organisation’s physical infrastructure.
Writes an overview of identity and access management (IAM) systems, including their Date of Observation:
Assessors are to record their observations in sufficient detail to demonstrate their judgement of the student’s performance against the criteria.
Document title: VU21990_AE_Pro_1of3
Page 8
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
importance and how they work.
Document title: VU21990_AE_Pro_1of3
Page 9
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Assessment feedback
NOTE: This section must
have the assessor signature and student signature to complete the feedback.
Assessment outcome
☐
Satisfactory
☐
Unsatisfactory
Assessor feedback
☐
Was the assessment event successfully completed?
☐
If no, was the resubmission/re-assessment successfully completed?
☐
Was reasonable adjustment in place for this assessment event?
If yes, ensure it is detailed on the assessment document.
Comments:
Assessor name, signature and date:
Student acknowledgement of assessment outcome
Would you like to make any comments about this assessment?
Student name, signature and date
NOTE: Make sure you have written your name at the bottom of each page of your submission
before attaching the cover sheet and submitting to your assessor for marking.
Document title: VU21990_AE_Pro_1of3
Page 10
of 10
Resource ID: TBS_18_028_VU21990_AE_Pro_1of3
STUDENT NAME: