Answer To: Trainer assessment pack (TAP) Table of Contents Assessment Pack (UAP) – Cover Sheet3 Student and...
Anjali answered on Jul 22 2022
Unit Assessment Pack (TAP)
ICTCYS407
Gather, analyse and interpret threat data
Table of Contents
Assessment Pack (UAP) – Cover Sheet 3
Student and Trainer/Assessor Details 3
Course and Unit Details 3
Assessment Submission Method 3
Student Declaration 3
Assessment Plan 4
Unit information pack 4
UAT 1 – Unit Knowledge Test (UKT) 5
Pre-assessment checklist 5
Purpose 5
Information for students 5
Reasonable adjustments 5
Student declaration 5
Assessment task instructions 6
Unit Assessment Result Sheet (UARS) 18
UAT 2 – Unit Project (UP) 20
Pre-assessment checklist 20
Purpose 20
Information for students 20
Reasonable adjustments 20
Student declaration 20
Assessment task instructions 21
Unit Assessment Result Sheet (UARS) 36
Purpose of unit Assessment Pack
This document is for the student and provides all the assessment tasks which need to be completed to be deemed competent in this unit. The document also provides instructions and information to assist the student to complete each assessment task. Students must respond to all questions and submit the assessment to their Assessor.
Copyright
This document was developed by VET Resources © 2021.
No part of this resources may be reproduced in any form or by any means, electronic or mechanical including photocopying or recording or by any information retrieval system without written permission from VET Resources. Legal action may be taken against any person who infringes their copyright through unauthorised copying.
Assessment Pack (UAP) – Cover Sheet
Student and Trainer/Assessor Details
Student ID
Student name
Trainer/Assessor name
Course and Unit Details
Course code
Course name
Unit code
ICTCYS407
Unit name
Gather, analyse and interpret threat data
Assessment Submission Method
☐ By hand to trainer/assessor
☐ By email to trainer/assessor
☐ Online submission via Learning Management System (LMS)
☐ By Australia Post to RTO
☐ Any other method _________________________________________________
(Please mention here)
Student Declaration
· I certify that the work submitted for this assessment pack is my own. I have clearly referenced any sources used in my submission. I understand that a false declaration is a form of malpractice.
· I have kept a copy of this assessment pack and all relevant notes, attachments, and reference material that I used in the production of the assessment pack;
· For the purposes of assessment, I give the Trainer/Assessor of this assessment the permission to:
· Reproduce this assessment and provide a copy to another member of staff; and
· Take steps to authenticate the assessment, including communicating a copy of this assessment to a checking service (which may retain a copy of the assessment on its database for future plagiarism checking).
Student signature
Date
Assessment Plan
To demonstrate competence in this unit, the student must be assessed as satisfactory in each of the following assessment tasks.
Evidence recorded
Evidence Type/ Method of assessment
Sufficient evidence recorded/Outcome
Unit Assessment Task 1
Unit Knowledge Test (UKT)
S / NS (First Attempt)
S / NS (Second Attempt)
Unit Assessment Task 2
Unit Project (UP)
S / NS (First Attempt)
S / NS (Second Attempt)
Final result
C ☐ NYC ☐
Date assessed
Trainer/Assessor Signature
Unit information pack
The student and Trainer/Assessor must read and understand all the information in the unit information pack before completing the unit assessment pack.
UAT 1 – Unit Knowledge Test (UKT)
Pre-assessment checklist
Purpose
The pre-assessment checklist helps students determine if they are ready for assessment. The Trainer/Assessor must review the checklist with the student before the student attempts the assessment task. If any items of the checklist are incomplete or not clear to the student, the Trainer/Assessor must provide relevant information to the student to ensure they understand the requirements of the assessment task. The student must ensure they are ready for the assessment task before undertaking it.
Information for students
· Please make sure you have completed the necessary prior learning before attempting this assessment.
· Please make sure your Trainer/Assessor has clearly explained the assessment process and tasks to be completed.
· Please make sure you understand what evidence is required to be collected and how.
· Please make sure you know your rights and the complaints and appeal process.
· Please make sure you discuss any special needs or reasonable adjustments to be considered during the assessment (refer to the Reasonable Adjustments Strategy Matrix and negotiate these with your Trainer/Assessor).
· Please make sure that you have access to a computer and the internet (if you prefer to type the answers).
· Please ensure that you have all the required resources needed to complete this Unit Assessment Task (UAT).
· Due date of this assessment task is according to your timetable.
· In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment can be granted by the Trainer/Assessor.
· Evidence of the compelling and compassionate circumstances must be provided together with your request for an extension to submit your assessment work.
· Request for an extension to submit your assessment work must be made before the due date of this assessment task.
Reasonable adjustments
· If student has requested a reasonable adjustment, then complete the reasonable adjustment form included in the unit information pack.
Student declaration
· I confirm that Trainer/Assessor has provided all the information related to the assessment task as included in the information for student section and I am ready for the assessment.
Student signature
Date
Assessment task instructions
Assessment type:
· Written Questions
Instructions provided to the student:
Assessment task description:
· This is the first (1) unit of assessment task that the student must successfully complete to be deemed competent in this unit of competency.
· The Unit Knowledge Test is comprised of fourteen (14) written questions.
· Student must respond to all the questions and submit them to the Trainer/Assessor.
· Student must answer all questions to the required level, e.g. provide the number of points, to be deemed satisfactory in this task.
· Trainer/Assessor is required to provide feedback within two weeks and notify students when results are available.
Applicable conditions:
· This knowledge test is untimed and is conducted as an open book test (this means student can refer to textbooks during the test).
· Student must read and respond to all questions.
· Student may handwrite/use computers to answer the questions.
· Student must complete the task independently.
· No marks or grades are allocated for this assessment task. The outcome of the task will be Satisfactory or Not Satisfactory.
· Trainer /Assessor must assess student’s written skills and knowledge as he/she completes this assessment task.
· The Trainer/Assessor may ask the student relevant questions on this assessment task to ensure that this is his/her own work.
Resubmissions and reattempts:
· Where a student’s answers are deemed not satisfactory after the first attempt, a resubmission attempt will be allowed.
· Student may speak to their Trainer/Assessor if the student has any difficulty in completing this task and requires a reasonable adjustment (e.g., can be given as an oral assessment).
· For more information, please refer to the RTO Student Handbook.
Location:
· This assessment task may be completed in (tick the relevant box):
☐ Learning Management System
☐ Classroom
☐ Simulated learning environment
☐ Workplace
Other: ____________________________________
· Trainer/Assessor will provide the student with further information regarding the location for completing this assessment task.
Purpose of the assessment
The purpose of the assessment is to check knowledge relevant to the unit.
Instructions for answering written questions:
· Students must complete a written assessment consisting of a series of questions.
· It is expected from students to correctly answer all the questions.
· Answers must demonstrate an understanding and application of relevant concepts, critical thinking, and good writing skills.
· Students must respond to all questions for this assessment in a concise manner, providing only information that is relevant.
· Student must use non-discriminatory language. The language should not devalue, demean, or exclude individuals or groups on the basis of such attributes including gender, disability, culture, race, religion, sexual preference, age and/or any other basis. Gender inclusive language should be used.
· Assessors must not accept responses/answers that have been copied directly from other sources materials.
Resources required to complete the assessment task:
· Computer
· Internet
· MS Word
· Learner guide
· PowerPoint presentation
· Unit assessment pack (UAP)
Question 1: Answer the following:
A.) What is the use of data recognition software tools? The answer must be between 50-100 words.
B.) Provide a brief description of the following data recognition tools:
· Adobe Acrobat Pro
· Microsoft OneNote
Answer must be between 50-100 words.
Satisfactory response
A.) Yes ☐
B.) Yes ☐
No ☐
No ☐
Use of data recognition software tool: There are different tools and technologies that are used to recognize the data such as optical character recognition, bar code recognition, and intelligent character recognition. This type of system allows the recognition of the data and processing of the data is done to extract the useful information. By using these tools a huge amount of data can be collected and this gathers data in the form of pictures, drawings, and screen clippings also. This software helps to reduce errors, increase accuracy, boost efficiency and save money. following is a detailed description of the two applications that work on data recognition techniques:
· Adobe Acrobat Pro: It is defined as the PDF reader that reads the data from the Pdfs that are available online or offline. The editing of data can also be performed in this application alongside the creation of pdfs from resources like blank documents, multiple existing PDF files, HTML, Images, screen captures and window captures
· Microsoft OneNote: This is the tool that is used for collecting the information in the form of drawings, screen clippings and for this purpose the web version of this application is the best option.
Question 2: Briefly explain the following sources of data:
· Firewalls
· Intrusion detection system (IDS)
· Access control systems
· Security and event management system (SIEM)
Answer for each must be between 30-80 words.
Satisfactory response
Yes ☐
No ☐
· Firewalls: It is defined as the network security devices that help to keep track of the outgoing and incoming traffic of the network. the filtering of traffic can be done easily by the use of a firewall application. There are basically two types of firewalls physical and software-based firewalls, software firewalls are used to filter the packet or data related to the network or internet such as monitoring the traffic from the ports of the laptops or the desktop whereas a physical firewall is a device that is installed between the network and the gateway for monitoring and regular the network traffic.
· Intrusion detection system (IDS): It is defined as the system that monitors the system for the malicious activity. It issues the alert when any malicious activity is detected and there are two different kinds of intrusion detection techniques network-based and host-based intrusion detection technique. `
· Access control systems: for optimum security and privacy access control systems are used, the security risks related to system or network devices access can be resolved by the use of an access control system. access control can be split into two groups such as cyber security and physical security.
· Security and event management system (SIEM): It is defined as the security solution that helps to recognize the different security threats and vulnerabilities. The log management can be performed by the use of an event management system and the network risks related to vent management can be avoided by the use of this technique.
Question 3: Briefly explain the troubleshooting process to deal with cybersecurity threats. Answer must be between
Satisfactory response
Yes ☐
No ☐
Troubleshooting is defined as the process of analyzing the problems throughout the network by using an iterative process. It is a more effective process because the individual component of the network can be analyzed by the use of this technique. Troubleshooters initially look for common, known causes. For example, when a laptop won't boot up, an obvious first step is to check whether the power cable is working. Once common issues are ruled out, troubleshooters must run through a checklist of components to identify where the failure is happening. The primary objectives of troubleshooting are to figure out why something doesn't work as intended and provide a solution to resolve the issue
Question 4: Answer the following:
A.) Briefly explain the features of network security. The answer must be between 40-80 words.
B.) Briefly explain the features of cybersecurity. The answer must be between 40-80 words.
C.) Provide detailed information about the principles of network security. The answer must be between 40-80 words.
D.) Provide detailed information about the principles of cybersecurity. The answer must be between 40-80 words.
Satisfactory response
A.) Yes ☐
B.) Yes ☐
C.) Yes ☐
D.) Yes ☐
No ☐
No ☐
No ☐
No ☐
Integrity, confidentiality, and accessibility of computer networks can be maintained by the use of network security protocols. the risks related to network security or weka nodes that are connected to the network can be avoided by considering the use of a set of rules. the different vulnerabilities of the networks can be exploited by opting for the use of network security.
Network security, application security, information security, operational security, and disaster recovery or business continuity are the major features of cyber security. It helps to defend the computers, servers, electronic devices, malicious attacks, mobile devices, and electronic systems that are connected to the network.
Principles of network security: there are three basic principles of network security confidentiality, integrity, and availability. All the companies that are dealing with networks need to follow the principles to manage the risks related to the security of the data. The sensitive information that is available on the network can be managed effectively by the use of these principles.
Principles of cyber security: There are different principles of cyber security that help to manage the cyber security risks such as Economy of mechanism, Least Privilege, Fail-safe defaults, and Open Design.
Question 5: Provide brief information about the following cybersecurity attacks:
Cybersecurity attacks
Description (Answer must be between 30-80 words)
A denial-of-service attack (DDOS)
Denial of service attack is defined as a cyberattack that affects the host connected to the network. A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services
SQL injection (SQLi)
SQL Injection is a code injection technique that might destroy your database
Cross-site scripting (XSS) attacks
Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to compromise the interactions that users have with a vulnerable application. sometimes written as XSS – involve malicious code being injected into otherwise trusted websites
Scripted attacks
Scripted network attacks refer to attacks automatically generated using automated scripts e.g DOS attacks and Probe attacks.
Hardware attacks
VMX - Virtual machine Extensions (Instructions on processors with x86 virtualization)
Bluepill
Extreme Privilege Escalation
Stepping p3wns
Attacks against Wi-Fi
Denial of services attack
Satisfactory response
Yes ☐
No ☐
Question 6: Briefly explain the following legislation requirements for gathering information about the threat:
· Privacy Act
· Confidentiality Act
· Cybercrime Act
Answer must be between 100-150 words.
Satisfactory response
Yes ☐
No ☐
· Privacy Act: IT regulates the handling of personal data, risks related to security can be managed efficiently by the use of this act
· Confidentiality Act: Confidentiality is paramount when working with parents and children, and when dealing with sensitive issues
· Cybercrime Act: The Cybercrimes Act 19 of 2020 intends: to create offenses which have a bearing on cybercrime; to criminalize the disclosure of data messages which are harmful
Question 7: Answer the following:
A.) Provide a brief description of the common cybersecurity threats:
· Computer virus
· Spyware threat
· Phishing
The answer must be between 180-220 words.
B.) What is the impact of cyber-attack on the...