no referencing is required. I repeat no referencing is required. Just need all the activities finished according to requirements

1 answer below »
no referencing is required. I repeat no referencing is required. Just need all the activities finished according to requirements


Trainer assessment pack (TAP) Table of Contents Assessment Pack (UAP) – Cover Sheet3 Student and Trainer/Assessor Details3 Course and Unit Details3 Assessment Submission Method3 Student Declaration3 Assessment Plan4 Unit information pack4 UAT 1 – Unit Knowledge Test (UKT)5 Pre-assessment checklist5 Purpose5 Information for students5 Reasonable adjustments5 Student declaration5 Assessment task instructions6 Unit Assessment Result Sheet (UARS)18 UAT 2 – Unit Project (UP)20 Pre-assessment checklist20 Purpose20 Information for students20 Reasonable adjustments20 Student declaration20 Assessment task instructions21 Unit Assessment Result Sheet (UARS)42 Purpose of unit Assessment Pack This document is for the student and provides all the assessment tasks which need to be completed to be deemed competent in this unit. The document also provides instructions and information to assist the student to complete each assessment task. Students must respond to all questions and submit the assessment to their Assessor. Copyright This document was developed by VET Resources © 2021. No part of this resources may be reproduced in any form or by any means, electronic or mechanical including photocopying or recording or by any information retrieval system without written permission from VET Resources. Legal action may be taken against any person who infringes their copyright through unauthorised copying. Assessment Pack (UAP) – Cover Sheet Student and Trainer/Assessor Details Student ID Student name Trainer/Assessor name Course and Unit Details Course code Course name Unit code ICTCYS610 Unit name Protect critical infrastructure for organisations Assessment Submission Method ☐ By hand to trainer/assessor ☐ By email to trainer/assessor ☐ Online submission via Learning Management System (LMS) ☐ By Australia Post to RTO ☐ Any other method _________________________________________________ (Please mention here) Student Declaration · I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice. · I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack; · For the purposes of assessment, I give the Trainer/Assessor of this assessment the permission to: · Reproduce this assessment and provide a copy to another member of staff; and · Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking). Student signature Date Assessment Plan To demonstrate competence in this unit, the student must be assessed as satisfactory in each of the following assessment tasks. Evidence recorded Evidence Type/ Method of assessment Sufficient evidence recorded/Outcome Unit Assessment Task 1 Unit Knowledge Test (UKT) S / NS (First Attempt) S / NS (Second Attempt) Unit Assessment Task 2 Unit Project (UP) S / NS (First Attempt) S / NS (Second Attempt) Final result C ☐ NYC ☐ Date assessed Trainer/Assessor Signature Unit information pack The student and Trainer/Assessor must read and understand all the information in the unit information pack before completing the unit assessment pack. UAT 1 – Unit Knowledge Test (UKT) Pre-assessment checklist Purpose The pre-assessment checklist helps students determine if they are ready for assessment. The Trainer/Assessor must review the checklist with the student before the student attempts the assessment task. If any items of the checklist are incomplete or not clear to the student, the Trainer/Assessor must provide relevant information to the student to ensure they understand the requirements of the assessment task. The student must ensure they are ready for the assessment task before undertaking it. Information for students · Please make sure you have completed the necessary prior learning before attempting this assessment. · Please make sure your Trainer/Assessor has clearly explained the assessment process and tasks to be completed. · Please make sure you understand what evidence is required to be collected and how. · Please make sure you know your rights and the complaints and appeal process. · Please make sure you discuss any special needs or reasonable adjustments to be considered during the assessment (refer to the Reasonable Adjustments Strategy Matrix and negotiate these with your Trainer/Assessor). · Please make sure that you have access to a computer and the internet (if you prefer to type the answers). · Please ensure that you have all the required resources needed to complete this Unit Assessment Task (UAT). · Due date of this assessment task is according to your timetable. · In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment can be granted by the Trainer/Assessor. · Evidence of the compelling and compassionate circumstances must be provided together with your request for an extension to submit your assessment work. · Request for an extension to submit your assessment work must be made before the due date of this assessment task. Reasonable adjustments · If student has requested a reasonable adjustment, then complete the reasonable adjustment form included in the unit information pack. Student declaration · I confirm that Trainer/Assessor has provided all the information related to the assessment task as included in the information for student section and I am ready for the assessment. Student signature Date Assessment task instructions Assessment type: · Written Questions  Instructions provided to the student: Assessment task description:      · This is the first (1) unit of assessment task that the student must successfully complete to be deemed competent in this unit of competency. · The Unit Knowledge Test is comprised of eleven (11) written questions. · Student must respond to all the questions and submit them to the Trainer/Assessor. · Student must answer all questions to the required level, e.g. provide the number of points, to be deemed satisfactory in this task. · Trainer/Assessor is required to provide feedback within two weeks and notify students when results are available.  Applicable conditions:    · This knowledge test is untimed and is conducted as an open book test (this means student can refer to textbooks during the test). · Student must read and respond to all questions. · Student may handwrite/use computers to answer the questions. · Student must complete the task independently. · No marks or grades are allocated for this assessment task. The outcome of the task will be Satisfactory or Not Satisfactory. · Trainer /Assessor must assess student’s written skills and knowledge as he/she completes this assessment task. · The Trainer/Assessor may ask the student relevant questions on this assessment task to ensure that this is his/her own work. Resubmissions and reattempts:  · Where a student’s answers are deemed not satisfactory after the first attempt, a resubmission attempt will be allowed. · Student may speak to their Trainer/Assessor if the student has any difficulty in completing this task and requires a reasonable adjustment (e.g., can be given as an oral assessment). · For more information, please refer to the RTO Student Handbook. Location: · This assessment task may be completed in (tick the relevant box): ☐ Learning Management System ☐ Classroom ☐ Simulated learning environment ☐ Workplace Other: ____________________________________ · Trainer/Assessor will provide the student with further information regarding the location for completing this assessment task.  Purpose of the assessment The purpose of the assessment is to check knowledge relevant to the unit. Instructions for answering written questions: · Students must complete a written assessment consisting of a series of questions. · It is expected from students to correctly answer all the questions. · Answers must demonstrate an understanding and application of relevant concepts, critical thinking, and good writing skills. · Students must respond to all questions for this assessment in a concise manner, providing only information that is relevant. · Student must use non-discriminatory language. The language should not devalue, demean, or exclude individuals or groups on the basis of such attributes including gender, disability, culture, race, religion, sexual preference, age and/or any other basis. Gender inclusive language should be used. · Assessors must not accept responses/answers that have been copied directly from other sources materials. Resources required to complete the assessment task: · Computer · Internet · MS Word · Learner guide · PowerPoint presentation · Unit Assessment Pack (UAP) · Access to other learning materials such as textbooks · Access to a computer, the internet and word-processing system such as MS Word. Question 1: Answer the following: A.) What is meant by critical infrastructure in cybersecurity? Answer must be between 40-80 words. B.) Briefly explain the following critical infrastructure sectors in cybersecurity: · Communication sector · Financial services sector Answer must be between 100-150 words. C.) Provide brief information about the role of cybersecurity in the critical infrastructure sectors. Answer must be between 50-100 words. Satisfactory response A.) Yes ☐ B.) Yes ☐ C.) Yes ☐ No ☐ No ☐ No ☐ Question 2: Answer the following: A.) What is meant by critical asset in cybersecurity? Answer must be between 40-80 words. B.) Provide brief information about the following critical assets of cybersecurity: · IT hardware · Data · Software Answer must be between 150-200 words. Satisfactory response A.) Yes ☐ B.) Yes ☐ No ☐ No ☐ Question 3: Briefly explain the following cybersecurity methodologies which are used to protect the data of any organisation: · Use of strong password · Install security software · Implement firewall Answer must be between 150-200 words. Satisfactory response Yes ☐ No ☐ Question 4: Briefly explain the following cybersecurity legislation, which is applicable while researching, analysing and developing a protection plan for the organisation: · Gramm Leach Billy Act · Cybercrime Act 2001 Answer must be between 100-150 words. Satisfactory response Yes ☐ No ☐ Question 5: Why does the organisation need to protect the data from cyber-attacks? Answer must be between 80-120 words. Satisfactory response Yes ☐ No ☐ Question 6: Answer the following: A.) What is meant by cybersecurity effectiveness? Answer must be between 30-60 words. B.) Briefly explain the following metrics which are used to check the effectiveness of cybersecurity: · Response time · Monitor data transfer Answer must be between 100-150 words. Satisfactory response A.) Yes ☐ B.) Yes ☐ No ☐ No ☐ Question 7: Answer the following: A.) What is meant by segmentation in cybersecurity? Answer must be between 40-80 words. B.) What are the benefits of segmentation? Answer must be between 50-100 words. Satisfactory response A.) Yes ☐ B.) Yes ☐ No ☐ No ☐ Question 8: What
Answered 5 days AfterAug 02, 2022

Answer To: no referencing is required. I repeat no referencing is required. Just need all the activities...

Shubham answered on Aug 04 2022
85 Votes
Trainer assessment pack (TAP)
(
ICTCYS610
Protect critical infrastructure for organisations
) (
Unit Assessment Pack
(TAP)
)
Table of Contents
Assessment Pack (UAP) – Cover Sheet    3
Student and Trainer/Assessor Details    3
Course and Unit Details    3
Assessment Submission Method    3
Student Declaration    3
Assessment Plan    4
Unit information pack    4
UAT 1 – Unit Knowledge Test (UKT)    5
Pre-assessment checklist    5
Purpose    5
Information for students    5
Reasonable adjustments    5
Student declaration    5
Assessment task instructions    6
Unit Assessment Result Sheet (UARS)    18
UAT 2 – Unit Project (UP)    20
Pre-assessment checklist    20
Purpose    20
Information for students    20
Reasonable adjustments    20
Student declaration    20
Assessment task instructions    21
Unit Assessment Result Sheet (UARS)    42
    Purpose of unit Assessment Pack
This document is for the student and provides all the assessment tasks which need to be completed to be deemed competent in this unit. The document also provides instructions and information to assist the student to complete each assessment task. Students must respond to all questions and submit the assessment to their Assessor.
    Copyright
This document was developed by VET Resources©2021.
No part of this resources may be reproduced in any form or by any means, electronic or mechanical including photocopying or recording or by any information retrieval system without written permission from VET Resources. Legal action may be taken against any person who infringes their copyright through unauthorised copying.
Assessment Pack (UAP) – Cover Sheet
Student and Trainer/Assessor Details
    Student ID
    
    Student name
    
    Train
er/Assessor name
    
Course and Unit Details
    Course code
    
    Course name
    
    Unit code
    ICTCYS610
    Unit name
    Protect critical infrastructure for organisations
Assessment Submission Method
    ☐ By hand to trainer/assessor
    ☐ By email totrainer/assessor
    ☐Online submission via Learning Management System (LMS)
    ☐ By Australia Post to RTO
    ☐ Any other method _________________________________________________
(Please mention here)
Student Declaration
    · I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice.
· I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
· For the purposes of assessment, I give the Trainer/Assessor of this assessment the permission to:
· Reproduce this assessment and provide a copy to another member of staff; and
· Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).
    Student signature
    
    Date
    
Assessment Plan
To demonstrate competence in this unit, the student must be assessed as satisfactory in each of the following assessment tasks.
    Evidence recorded
    Evidence Type/ Method of assessment
    Sufficient evidence recorded/Outcome
    Unit Assessment Task 1
    Unit Knowledge Test (UKT)
    S / NS (First Attempt)
S / NS (Second Attempt)
    Unit Assessment Task 2
    Unit Project (UP)
    S / NS (First Attempt)
S / NS (Second Attempt)
    Final result
    C ☐ NYC ☐
    Date assessed
    
    
    
    Trainer/Assessor Signature
    
Unit information pack
    The student and Trainer/Assessor must read and understand all the information in the unit information pack before completing the unit assessment pack.
    
    UAT 1 – Unit Knowledge Test (UKT)
Pre-assessment checklist
Purpose
The pre-assessment checklist helps students determine if they are ready for assessment. The Trainer/Assessor must review the checklist with the student before the student attempts the assessment task. If any items of the checklist are incomplete or not clear to the student, the Trainer/Assessor must provide relevant information to the student to ensure they understand the requirements of the assessment task. The student must ensure they are ready for the assessment task before undertaking it.
Information for students
· Please make sure you have completed the necessary prior learning before attempting this assessment.
· Please make sure your Trainer/Assessor has clearly explained the assessment process and tasks to be completed.
· Please make sure you understand what evidence is required to be collected and how.
· Please make sure you know your rights and the complaints and appeal process.
· Please make sure you discuss any special needs or reasonable adjustments to be considered during the assessment (refer to the Reasonable Adjustments Strategy Matrix and negotiate these with your Trainer/Assessor).
· Please make sure that you have access to a computer and the internet (if you prefer to type the answers).
· Please ensure that you have all the required resources needed to complete this Unit Assessment Task (UAT).
· Due date of this assessment task is according to your timetable.
· In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment can be granted by the Trainer/Assessor.
· Evidence of the compelling and compassionate circumstances must be provided together with your request for an extension to submit your assessment work.
· Request for an extension to submit your assessment work must be made before the due date of this assessment task.
Reasonable adjustments
· If student has requested a reasonable adjustment, then complete the reasonable adjustment form included in the unit information pack.
Student declaration
· I confirm that Trainer/Assessor has provided all the information related to the assessment task as included in the information for student section and I am ready for the assessment.
    Student signature
    
    Date
    
    
    
Assessment task instructions
Assessment type:
· Written Questions
 Instructions provided to the student:
Assessment task description:
· This is the first (1) unit of assessment task that the student must successfully complete to be deemed competent in this unit of competency.
· The Unit Knowledge Test is comprised of eleven (11) written questions.
· Student must respond to all the questions and submit them to the Trainer/Assessor.
· Student must answer all questions to the required level, e.g. provide the number of points, to be deemed satisfactory in this task.
· Trainer/Assessor is required to provide feedback within two weeks and notify students when results are available.
 Applicable conditions:
· This knowledge test is untimed and is conducted as an open book test (this means student can refer to textbooks during the test).
· Student must read and respond to all questions.
· Student may handwrite/use computers to answer the questions.
· Student must complete the task independently.
· No marks or grades are allocated for this assessment task. The outcome of the task will be Satisfactory or Not Satisfactory.
· Trainer /Assessor must assess student’s written skills and knowledge as he/she completes this assessment task.
· The Trainer/Assessor may ask the student relevant questions on this assessment task to ensure that this is his/her own work.
Resubmissions and reattempts:
· Where a student’s answers are deemed not satisfactory after the first attempt, a resubmission attempt will be allowed.
· Student may speak to their Trainer/Assessor if the student has any difficulty in completing this task and requiresa reasonable adjustment (e.g., can be given as an oral assessment).
· For more information, please refer to the RTO Student Handbook.
Location:
· This assessment task may be completed in (tick the relevant box):
    ☐ Learning Management System
    ☐ Classroom
    ☐ Simulated learning environment
    ☐ Workplace
    Other: ____________________________________
· Trainer/Assessor will provide the student with further information regarding the location for completing this assessment task.
 Purpose of the assessment
The purpose of the assessment is to check knowledge relevant to the unit.
Instructions for answering written questions:
· Students must complete a written assessment consisting of a series of questions.
· It is expected from students to correctly answer all the questions.
· Answers must demonstrate an understanding and application of relevant concepts, critical thinking, and good writing skills.
· Students must respond to all questions for this assessment in a concise manner, providing only information that is relevant.
· Student must use non-discriminatory language. The language should not devalue, demean, or exclude individuals or groups on the basis of such attributes including gender, disability, culture, race, religion, sexual preference, age and/or any other basis. Gender inclusive language should be used.
· Assessors must not accept responses/answers that have been copied directly from other sources materials.
    
    
Resources required to complete the assessment task:
· Computer
· Internet
· MS Word
· Learner guide
· PowerPoint presentation
· Unit Assessment Pack (UAP)
· Access to other learning materials such as textbooks
· Access to a computer, the internet and word-processing system such as MS Word.
    Question 1: Answer the following:
A.) What is meant by critical infrastructure in cybersecurity? Answer must be between 40-80 words.
B.) Briefly explain the following critical infrastructure sectors in cybersecurity:
· Communication sector
· Financial services sector
Answer must be between 100-150 words.
C.) Provide brief information about the role of cybersecurity in the critical infrastructure sectors. Answer must be between 50-100 words.
    Satisfactory response
    
    A.) Yes ☐
B.) Yes ☐
C.) Yes ☐
    No ☐
No ☐
No ☐
    A.
Critical infrastructure in cybersecurity describes cyber and physical system debilitating the impact on economic and physical security. It is the area of concern that surrounds the protection of network, assets and system with continuous operation according to demand for the system.
B. In the communication sector, the use of edge devices, end user services and core network elements can be the target of hackers. It is important to provide protection to highly sensitive information like financial data, address and name. It also targets the house of router from internet service provider.
In the financial sector, cyber security is requiring for avoiding backdoor hacking. This can be the concern and it can help in providing better communication. It is required for protecting from DDoS attacks that can increase the bandwidth during the process of transaction. It can help in avoiding critical vulnerability.
C. It is the area of concern for protecting the network, assets and system for continuous operation that is deemed necessary for ensuring security of the given economy. It can help in avoiding security issues and it can be the effort for providing security along with saving the infrastructure from random attacks.
    Question 2: Answer the following:
A.) What is meant by critical asset in cybersecurity? Answer must be between 40-80 words.
B.) Provide brief information about the following critical assets of cybersecurity:
· IT hardware
· Data
· Software
Answer must be between 150-200 words.
    Satisfactory response
    
    A.) Yes ☐
B.) Yes ☐
    No ☐
No ☐
    
A. It is essential and it is organizational resources that are required for maintaining operations and achieving mission of the organization. It can help in protecting from insider threat and provides security to vital assets from malicious attacks like DDoS.
B. IT assets are components, device and data that provide support and information related to activities. It includes software hardware and confidential information. It provides with comprehensive and centralized view of networked software and hardware across enterprise for reducing response time and vulnerability.
Data includes information about value, acceptable use, ownership and information. This is required for managing the process in real-time. It includes the information that can be translated in the form of efficient process and movement. It can be used for describing the information in the digital format.
Software can help in protecting user from cyber attack like changing, accessing and destroying sensitive information. The use of cyber security tool can help in conducting privacy audit for software and removing latest threats. The tool can help in managing forensic analysis and access control. This provides with complete security in real-time for protecting against malware along with safe browsing.
    Question 3: Briefly explain the following cybersecurity methodologies which are used to protect the data of any organisation:
· Use of strong password
· Install security software
· Implement firewall
Answer must be between 150-200 words.
    Satisfactory response
    
    Yes ☐
    No ☐
    
The use of strong password is considered as first line of defence against unauthorized access to the personal information and computer system. The use of strong password can help in protecting from malicious software and hackers. It is essential for protecting from identity theft and financial fraud. It can help in protecting from cyber crime and provides security.
Installation of security software is required and the software is designed for protecting and securing devices, network and server from unauthorized access. The unauthorized access like threat, virus and intrusion can be terminated. It can help in defending users, data and system from wide range of risks.
Firewall is the most important element in cyber security as it provides protection against cyber attacks by providing the shield for computer and network from unauthorized traffic. It can help in preventing use of malicious software from accessing network and computer system through the internet.
    Question 4: Briefly explain the following cybersecurity legislation, which is applicable while researching, analysing and developing a protection plan for the organisation:
· Gramm Leach Billy Act
· Cybercrime Act 2001
Answer must be between 100-150 words.
    Satisfactory response
    
    Yes ☐
    No ☐
    
Gramm Leach Billy Act is known as financial modernization and it provides with the way for controlling the way for dealing with private information. This can help in regulation of disclosure and collection of private financial information. It can help in governing security and data security as the part of comprehensive information for ensuring security policy.
Cybercrime Act 2001 is created for investigation powers and criminal offenses that are designed for protecting the reliability, integrity and security of computer data. This can help in finding increases the problem that is emerging from online business in the area of IT security.
    Question 5: Why does the organisation need to protect the data from cyber-attacks? Answer must be between 80-120 words.
    Satisfactory response
    
    Yes ☐
    No ☐
    
The organization needs to be protected from cyber attack as this includes the process of securing devices and provide a secure connection for accessing the information. This also includes testing strength of password that cannot be compromised. This also includes the process of using antivirus and firewall that can help in keeping device and network from unauthorized access. The use of anti-virus application can help in collecting and monitoring the information and it is designed in the way for providing real-time protection for blocking threats and incoming information.
    Question 6: Answer the following:
A.) What is meant by cybersecurity effectiveness? Answer must be between 30-60 words.
B.) Briefly explain the following metrics which are used to check the effectiveness of cybersecurity:
· Response time
· Monitor data transfer
Answer must be between 100-150 words.
    Satisfactory response
    
    A.) Yes ☐
B.) Yes ☐
    No ☐
No ☐
    
A. Cyber security effectiveness refers to strength, weakness and efficiency of measures that are taken for protecting digitalized assets and information of the organization. It includes process and control for protecting the system and network.
B. Response time is considered as elapsed time between the response and inquiry of the system. It is used as a measurement for system performance and it refers to service requests in variety of technologies. This factor includes loading pages, memory handling and database queries.
Monitoring data transfer includes the data for importing the data to system and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here