Language:EN
Pages: 36
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
rto code date updated roles and responsibilitiesas

Rto code date updated roles and responsibilitiesas part your job role

SOLVED ANSWER AVAILABLE HERE UNLOCK ME PLEASE

Assessment Task Instructions for Students

Section 1: Information for Students

☐ Make sure you have completed the necessary prior learning before attempting this assessment.

☐ Make sure that you have all the required resources needed to complete this Assessment Task (AT). ☐ The due date of this assessment task is in accordance with your timetable.

☐ In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment can be granted by the trainer/assessor. Evidence of the compelling and compassionate circumstances must be provided together with your request for an extension to submit your assessment work.

☐ I do not require reasonable adjustment

Declaration (Student to complete)
☐ I confirm that the purpose and procedures of this assessment task has been clearly explained to me. ☐ I confirm that I have been consulted about any special needs I might have in relation to the assessment process.

Student Name: ______________________________________

Student Signature: ___________________________________

Page 2 of 37 Date created: 28/03/2022

Assessment

method-based instructions and

Assessment task description:

You are required to contribute to cybersecurity risk management in this assessment task.

You will receive your feedback within two (2) weeks, and you will be notified by your

trainer/assessor when your results are available.

You must read and respond to all the criteria of the project.

You may handwrite/use computers to answer the criteria of the project.

Resubmissions and reattempts:

Where a student’s answers are deemed not satisfactory after the first attempt, a


 This assessment task may be completed in:

Page 3 of 37 Date created: 28/03/2022

☐a classroom
☐ learning management system (i.e. Moodle),
☐workplace,
☐or an independent learning environment.

Your Trainer/Assessor will provide you with further information regarding the location for completing this assessment task.

 Skills to consult with stakeholders to determine the scope of risk management

appropriate to organisation and industry.

 Skills to present options for risk management strategies for approval within scope of

own role.

personnel.

 Skills to contribute to monitoring cybersecurity risk according to selected risk

according to organisational policies and procedures.

 Skills to assist in establishing feedback processes that provide warning of potential

© Canberra Institute of Technology

Page 4 of 37 Date created: 28/03/2022

 Skills to update risk management strategies with new information as required.

Assessment environment

© Canberra Institute of Technology

Page 5 of 37 Date created: 28/03/2022

Assessment task instructions

The purpose of this assessment task is to contribute to cybersecurity risk management, which includes assisting in developing and managing associated risk management strategies that control two different identified cyber security risks and document the response option applied to each risk.

In this assessment task, you will be required to work in a team with four other team

The training organisation must ensure that the simulated assessment environment is in accordance with the requirements specified.

The student will take on the role of the staff member required to work effectively and efficiently in a team to protect the computer systems and networks from the theft of or damage to any hardware, software or electronic data, as well as from the distribution or misdirection of the services the organisation provides.

The trainer/assessor must assess the student using the performance checklist provided.

Simulated environment requirements

© Canberra Institute of Technology

Page 6 of 37 Date created: 28/03/2022

The simulated environment must meet the following criteria:

Opportunities for the student to: Yes/No/NA

tasks

Experience prioritising competing tasks and dealing with contingencies

Resources, tools, and equipment requirements

The following resources, tools and equipment will be made available by the training organisation

 a device with an active internet connection

 internet browser

o
Notifiable Data Breach (NDB) Scheme

.

Page 7 of 37 Date created: 28/03/2022

o Privacy Act 1988

Simulated assessment scenario

The following are the goals and objectives to complete this assessment task:

 Contribute to recommending risk management strategies that mitigate cybersecurity risk

policies and procedures

 Present options for risk management strategies for approval within scope of own role

strategies

 Assist in determining compliance with implemented cyber risk mitigation strategies

 Review and revise implemented risk management strategies

 Identify benchmarks to track the effectiveness of risk management strategies

The supervisor will act according to job role and responsibilities.

The supervisor can be your trainer or assessor or a different trainer or assessor or a staff

Page 8 of 37 Date created: 28/03/2022

Date updated: 31/05/2022

 Consult with stakeholders to assess the required organisational and industrial risk

management scope

 Present options for approval of risk management strategies within the framework of your

position

 Contribute to cybersecurity risk assessment in compliance with defined risk management

techniques

to organisational requirements

 Evaluate and update the risk management techniques implemented

This assessment task requires you to work effectively as part of project-based teams for an

online training and education institute. You need to complete the following activities:

© Canberra Institute of Technology

Page 9 of 37 Date created: 28/03/2022

CRICOS No. 00001K | RTO Code 0101

 Activity 4: Documenting approved risk management strategies

 Activity 5: Supporting the implementation of approved risk management strategies

© Canberra Institute of Technology

Page 10 of 37 Date created: 28/03/2022

CRICOS No. 00001K | RTO Code 0101

This assessment task requires you to work effectively as part of project-based teams for an online training and education institute. You are required to read and understand a predetermined issue and/or situation and participate in a number of assessment activities. You need to complete the following activities:

 Activity 1: Understand the team structure, roles, and responsibilities

 Activity 5: Identify and report any issues preventing the completion of workplace tasks

 Activity 6: Complete and submit the project

You have started working in the ICT department of your training organisation.

Your online training organisation offers courses in several streams including but not limited to graphics designing, computer networking, cloud computing and cybersecurity.

© Canberra Institute of Technology

Page 11 of 37 Date created: 28/03/2022

CRICOS No. 00001K | RTO Code 0101

software or electronic data, as well as from the distribution or misdirection of the services the

organisation provides.

training and education programs for all workplace personnel.

Your organisational policies and procedures recommend you to follow a number of industry

• European Union Agency for Network and Information

• Security (ENSISA)

One of the main recommendations is to follow ISO/IEC 27001 standards.

The ISO 27001 standard specifies five main pillars for managing cybersecurity risk, as well as

4. Consequence mitigation/ Consequence reduction

5. Enable cybersecurity outcome/ Allow for a successful cybersecurity outcome

information within the scope of the information security management system (ISMS)

(6.1.2.c.1);

Page 12 of 37 Date created: 28/03/2022

Date updated: 31/05/2022

7. Prioritise the risks for treatment (6.1.2.e.2).

You will be required to consider introducing new cyber-defence technologies that go beyond IT

Your supervisor has allocated a team to complete this project. You must complete this task

considering the following assessment requirements:

out the assessment.

o Your trainer/assessor and other stakeholders will still provide you with assistance

 Have legislative and regulatory knowledge relating to cybersecurity risk management,

including:

 Consult with stakeholders to understand the scope of risk management required

 Identify the risks after carrying out a risk assessment by identifying existing cybersecurity

Page 13 of 37 Date created: 28/03/2022

CRICOS No. 00001K | RTO Code 0101

Date updated: 31/05/2022

 Support the implementation of approved risk management strategies

 Address non-compliance within scope of own role and escalating matters where required

a house or workplace as an example system.

Assessment activities

You will be required to understand your own responsibilities, responsibilities of your team

members, articulate team structure and plan and prioritise own tasks according to the given time

mathematical data is always an integral component of the assessment.

The task requires you to prepare yourself to:

Page 14 of 37 Date created: 28/03/2022

 access the information communications and technology (ICT) related legislative

 contribute to suggesting the risk management strategies that mitigate cybersecurity risks

present in the environment.

above. You must record all the questions asked in the appropriate sections allocated for this

purpose.

Page 15 of 37 Date created: 28/03/2022

CRICOS No. 00001K | RTO Code 0101

Date updated: 31/05/2022

© Canberra Institute of Technology

Page 16 of 37 Date created: 28/03/2022

assessment activity.

Template: Understanding your job role and responsibilities

Page 17 of 37 Date created: 28/03/2022

Date updated: 31/05/2022

N/S

Trainer/Assessor to complete
(Comment and feedback to students)

a) The role and responsibilities are clearly outlined and understood

Page 18 of 37 Date created: 28/03/2022

Date updated: 31/05/2022

Activity context

In this assessment activity, you will be required to review relevant critical cyber risk management

You are expected to:

 Complete the initial risk assessment according to the assessment criteria mentioned below

Initial cybersecurity risk assessment – Research, identify, assess and analyse, understand and record your observations.

Note: To correctly participate in the activities in this assessment task, the student is required to read the case study scenario and conduct extensive research online and offline using library resources and learner resources provided with the unit of competency.

Category/ Severity Description of the risks (Rank each risk/vulnerability in

d

level of the risks

Very high

© Canberra Institute of Technology

Page 19 of 37 Date created: 28/03/2022

b) Read the scenario and participate in the following activity:

Three separate users with varying permissions and user access rights are attempting to access Workstation 1. The network diagram will appear as follows:

regular cyber incident response training and education programs for all workplace personnel

Page 20 of 37 Date created: 28/03/2022

Performance Checklist: Activity 2

Your task must address the following performance criteria/ performance checklist.

N/S

b) The requirements to secure the

systems and procedures

 regular cyber incident response

Page 21 of 37 Date created: 28/03/2022

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Kelly Mitchell

PageId: DOCF669C90