BSBXCS402 Promote Workplace Cyber Security Awareness and Best Practices ASSESSMENT TASK 1 Knowledge Questions ICT50220 Diploma of Information Technology ASSESSMENT TASK 1 COVER SHEET Please ensure...

2 answer below »
no referencing required
BSBXCS402 Promote Workplace Cyber Security Awareness and Best PracticesASSESSMENT TASK 1Knowledge QuestionsICT50220 Diploma of Information TechnologyASSESSMENT TASK 1 COVER SHEETPlease ensure this form is fully completed prior to submitting.This page MUST be on the front of your assessment and needs to be easily accessible, filled in and signed. Student Number:Win200253Student Name:Sumit BhattaraiCourse:ICT50220 Diploma of Information TechnologySubject:BSBXCS402 Promote workplace cyber security awareness and best practicesSTUDENT DECLARATIONI hereby certify that:· This assessment task is my own work based on my personal study/research and not the work of another student and/or source.· I have acknowledged all material and sources used to prepare this assessment task. · I have not plagiarised or copied any part of this assessment task from the work of any other student or source either. (I know the penalties for plagiarism include $200 re-assessment fee)· This assessment task has not previously been submitted.· I am aware of the requirements set by my Trainer & Assessor.· I have retained a copy of this assessment task for my own records.· I have completed all my assessments, tasks & activities (on Moodle®) successfully.Students Signature:Sumit BhattaraiDate:16/02/2022Wentworth Institute RTO Code: 91178 November 2017 Version: 1.0Student instructionsThis assessment must be based on where you work (or have worked most recently). This Assessment is designed to test the knowledge that you have acquired throughout the unit. Use the following tips to help you answer the questions:Read each question carefully. Check with your trainer or assessor if you are not sure what the question is asking.HINT: Use these questions as subheadings to create a business style report to answer your assessmentYour response to each question should aim to provide enough information to answer the question. In most cases, this can be done with just a few paragraphs. Don’t forget to refer to attachments under the heading (question) applicable, e.g. ‘See attached email’.Important: Your assessment must contain this coversheet and your own coversheet (for your “report”)Your answers & assessment submission must be professional in style (Business), content and format. Maximum font size 11 points: Font Arial or Times New Roman; single spacing; clear paragraphs with appropriate punctuation, spellchecking and final submission will need to be proof-read. (i.e., few missing words or typos)In particular:· Use clear, non-discriminatory language· use business-like language· Avoid the use of jargon· Write clearly using plain English· Consider your target audience· Ensure that your responses meet the needs of the target audience (in this case your trainer or assessor).· All of your work must be original.Written answer question guidance· The following written questions use a range of “instructional words” such as “identify” or “explain”, which tell you how you should answer the question. Use the definitions below to assist you to provide the type of response expected. · Note that the following guidance is the minimum level of response required. Analyse: when a question asks you to analyse something, you should do so in detail, and identify important points and key features. Generally, you are expected to write a response one or two paragraphs long. Compare: when a question asks you to compare something, you will need to show how two or more things are similar, ensuring that you also indicate the relevance of the consequences. Generally, you are expected to write a response one or two paragraphs long.Contrast: when a question asks you to contrast something, you will need to show how two or more things are different, ensuring you indicate the relevance or the consequences. Generally, you are expected to write a response one or two paragraphs long.Describe: when a question asks you to describe something, you should state the most noticeable qualities or features. Generally, you are expected to write a response two or three sentences long.Discuss: when a question asks you to discuss something, you are required to point out important issues or features and express some form of critical judgement. Generally, you are expected to write a response one or two paragraphs long.Evaluate: when a question asks you to evaluate something, you should put forward arguments for and against something. Generally, you are expected to write a response one or two paragraphs long.Examine: when a question asks you to examine something, this is similar to “analyse”, where you should provide a detailed response with key points and features and provide critical analysis. Generally, you are expected to write a response one or two paragraphs long.Explain: when a question asks you to explain something, you should make clear how or why something happened or the way it is. Generally, you are expected to write a response two or three sentences long.Identify: when a question asks you to identify something, this means that you are asked to briefly describe the required information. Generally, you are expected to write a response two or three sentences long.List: when a question asks you to list something, this means that you are asked to briefly state information in a list format. Outline: when a question asks you to outline something, this means giving only the main points, Generally, you are expected to write a response a few sentences long.Summarise: when a question asks you to summarise something, this means (like “outline”) only giving the main points. Generally, you are expected to write a response a few sentences long.Performance EvidenceEvidence of the ability to:· develop one set of policies and procedures for a work area that promote cyber security awareness and practices· arrange training or updates to be provided to colleagues that support practice or awareness in relation to two different cyber security matters.Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.Knowledge EvidenceTo complete the unit requirements safely and effectively, the individual must: · legislative requirements relating to cyber security context of performance evidence, including: · data protection · implications of Notifiable Data Breach legislation on an organisation and other associated Australian privacy laws· established international legislation· organisational policies and procedures relating to:· securely storing, sharing and managing information· encryption, and protocols for its uses· data classification and management· media/document labelling· data governance· acceptable use· bring your own device· Australian government sources of information on current threats· risks associated with workplace cyber security· strategies and techniques for promoting workplace cyber security· techniques for:· implementing and promoting workplace cyber security awareness· facilitating training that promotes cyber security awareness, including the use of simulated activities.Assessment ConditionsSkills in this unit must be demonstrated in a workplace or simulated environment where the conditions are typical of those in a working environment in this industry· information and data sources relating to cyber security· device with active internet connection· internet browser· industry standards and organisational procedures required to demonstrate the performance evidence.· Assessors must satisfy NVR/AQTF assessor requirements.To achieve competency for this unit:All assessment activities in this unit must be successfully completed.The student must achieve a SATISFACTORY result in all the assessment activities in this unit to be deemed COMPENTENT.Students must perform to the standard as expressed by the competency standards of the ICT Training Package. Reasonable Adjustment:Reasonable adjustment is any approved modification or allowance made in assessment to accommodate a disability related function. Reasonable adjustment allows a learner with a disability to participate equitably in assessment procedures and demonstrate required skills and knowledge. Adjustment could be made in the physical environment, the assessment strategies or using assistive technology. Any adjustments made to the assessment must preserve the integrity of the assessment outcome.Ensure that you:· comply with the due date for assessment which your assessor will provide· adhere with your RTO’s submission guidelines· answer all questions completely and correctly · submit work, which is original and, where necessary, properly referenced· submit a completed cover sheet with your work· avoid sharing your answers with other students.Marking and Criteria guide:   Assessor and student must read this carefully before assessment. · All parts of the assessment must be completed successfully in accordance with the guidance provided in the Marking guide for the student to achieve competence in this unit.· Students & assessors must note that professionally critical aspects/concepts must be included (e.g., obtain knowledge on cyber security).· All parts (criteria) in the marking guide must be completed successfully for the student to achieve competence in this unit. EDUCATOR to complete.Assessment Task 1Observation/AssessmentSatisfactory/Not SatisfactoryComments1. The student has described what is cyber security? Add Scale2. The student has described why would there be legislative requirements that are relating to cyber security? Add Scale3. The student has described what is meant by data protection? Add Scale4. The student has described why would there be legislative requirements for data protection in relation to cyber security? Add Scale5. The student has described what would be the implications of a Notifiable Data BreachAdd Scale6. The student has described what are the Australian Privacy Laws? Add Scale7. The student has described what is the international Legislation in regard to cyber security? Add Scale8. The student has described the International Legislation differ from the Australian? Add Scale9. The student has found information on the Australian Government Websites in regard to new Cyber Security threats. Add ScaleAssessment Task 110. The student has described what are the risks that are associated with work-place Cyber Security? Add Scale11. The student has described what would be the strategies and the techniques be for promoting workplace Cyber Security and making sure everyone is aware of current threats? Add Scale12. The student has described how would you implement this new strategy?Add Scale13. The student has described how would you train your employees in workplace cyber security based on your findings of the current threat from point 10 above? Add Scale14. The student has described what type of simulation training could be created to help in the promotion and training of protecting yourself and the company you work for in cyber security? Add Scale15. The student has answered the question as to what would be the organisational policies and procedures in relation to;15.1 How a company securely store company information15.2 How a company manage sharing of resources15.3 How
Answered 27 days AfterJun 16, 2022

Answer To: BSBXCS402 Promote Workplace Cyber Security Awareness and Best Practices ASSESSMENT TASK 1 Knowledge...

Anjali answered on Jun 23 2022
13 Votes
Email & Internet Policy
1 Overview
Electronic email is pervasively used in almost all industry verticals and
is often the primary communication and awareness method within an organization. At the same time, misuse of email can pose many legal, privacy, and security risks, thus it’s important for users to understand the appropriate use of electronic communications.
2 Purpose
The purpose of this email policy is to ensure the proper use of the WIN college Email system and make users aware of what WIN college deems as acceptable and unacceptable use of its email system. This policy outlines the minimum requirements for use of email within WIN College Network.
3 Scope
This policy covers the appropriate use of any email sent from a WIN college staff member's email address and applies to all employees, vendors, and agents operating on behalf of WIN college staff members.
4 Policy
By incorporating the use of encryption techniques and two-way authentication techniques the risks related to the security of data and assets can be avoided.
To manage unauthorized access issues two-way authentication is...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here