Analyse and interpret threat datacontents ictcys gather
Student
Assessment Guide: ICTCYS407 Gather, analyse and interpret
![]() |
---|
Disclaimer:
The Australian College of Business Intelligence does not invite reliance upon, nor accept responsibility for, the information it provides. The Australian College of Business Intelligence makes every effort to provide a high-quality service. However, neither the Australian College of Business Intelligence, nor the providers of data, gives any guarantees, undertakings or warranties concerning the accuracy, completeness or up-to-date nature of the information provided. Users should confirm information from another source if it is of sufficient importance for them to do so.
![]() |
---|
![]() |
---|
1. Assessment Information
A. Purpose of assessment
All tasks of this assessment require you to use the provided case study information relating to the college Sydney Institute.
C. Competencies being assessed
![]() |
|
---|
Performance Evidence
o firewall info
o systems
Knowledge Evidence
You must be able to demonstrate knowledge of the following:
o access control systems
o security and event management systems (SIEM)
o SQL injection (SQLi)
o cross-site scripting (XSS) attacks
• common cyber security threats and their impacts on business functions
• organisational policies and procedures applicable to gathering, analysing and interpreting threat
processes in obtaining and analysing results.
To complete this assessment, please refer to the following resources provided on Moodle:
ICTCYS407 learner guide
ICTCYS407 Marking Guide
ICTCYS407 Case study folder
Additional student assessment informationG. Instructions for completing this assessment
Answer the questions below using the spaces provided:
![]() |
|
---|
Please refer to the “Instructions for Submitting Your Assessment” found within the unit course page on Moodle.
![]() |
---|
2. Assessment Coversheet
Candidate Name:
Qualification: ICT50220 Diploma of Information Technology = Front end web development
Units of Competency: ICTCYS407 Gather, analyse and interpret threat data
Due Date: 09 May 2021 Date Submitted: 04 May 2021
Declaration: I have read and understood the following information at the beginning of
I declare this assessment is my own work and where the work is of others, I
have fully referenced that material.
|
|
||
---|---|---|---|
|
|
|
|
|
---|
|
---|
B. Task B – Prepare to gather threat data
|
|
|
---|
|
---|
|
|
---|
|
|
C. Task C - Analyse threat data
|
---|
|
|
|