BHI & CAE ASSESSMENT COVER SHEET
This form must be attached to the front of all submitted hard copy assessments.
Student Details: Student to complete
Xuan Yu(Faith) Tiong
Student ID :
By signing below, I declare that the work submitted here is my own work and it does not include work which is plagiarised, copied in whole or in part from another student or other source such as published books, internet or journals without due acknowledgement in the text.
Xuan Yu Tiong
Assessment Details: Teacher to complete
Course National ID and Title
22334VIC Certificate IV in Cyber Security
Unit/s National ID and Title
VU XXXXXXXXXXImplement Network Security Infrastructure for an Organization Instructor Guide
Assessment Task number and name
Assessment Task 1: An anatomy of a cyber attack
Sunday after session 3 class
Assessment Result and Feedback
|_| Not yet Satisfactory
Re-submit date if required:
If you believe that you have been assessed unfairly, you have the right to request an informal assessment review. When your assessment cover sheet is returned to you, you can request an informal review by filling in the section below and returning it to your assessor or the Operations Manager of your area. If you are not satisfied with the outcome, you can apply for a formal review of assessment on the application form located on the Box Hill Institute Website https://goo.gl/Pb3Rtx
VCE courses: VCAA rules and regulations replace the above assessment review. Please see your VCE Teacher or VCE Coordinator for further discussion.
I request a review of my assessment for the following reasons (not applicable to VCE courses):
Instructions to Student
Assessment task name
Assessment Task 1: An anatomy of a cyber attack
Assessment task type
Week 1 – 3 in class and at home as required
Where the assessment will take place
In timetabled classroom
Personal protective equipment required
Report Issues to Teacher or coordinators as appropriate
PC on campus during class time
Individual or group work
Individual & Group Work
Support equipment allowed i.e.: calculator, dictionary
All tools as appropriate for the assessment
Context and conditions of assessment
Assessment must be conducted in a safe environment where evidence gathered demonstrates consistent performance of typical activities experienced in the knowledge management – research field of work and include access to:
· workplace information systems, equipment and resources
· workplace policies and procedures
· Case studies and, where possible, real situations.
Assessors must satisfy NVR/AQTF assessor requirements.
What to submit
The completed report is to be submitted to StudentWeb under the Assessment Task 1: An anatomy of a cyber attack
How to submit
Submit the completed document (this document) to the Assessment Task 1: An anatomy of a cyber attack section on StudentWeb.
How to present your work
Complete this word document and answer all questions in the spaces provided. The coversheet must be submitted when uploading to StudentWeb.
How many attempts at assessment are permitted
Students will be given 2 attempts to resubmit an assessment; additional attempts must be organized with teacher and student prior to submission.
Naming protocol for electronic files
E.g.: S10054440_AT1_ API.doc
All files that do not have this naming convention will be sent back to you as it resembles part of you assessment that the information is corrected handled and stored.
How will the assessment judgement be made
|_| Observation checklist
|_| Answer guide
If at any time during the learning and assessment process, your Trainer/Assessor considers that the safety of any person is at risk they will abort the session.
Students identifying as having a disability may access reasonable adjustment to enable them to participate in training and assessment on the same basis as other students. Students can learn more about this through the Learners with a disability policy and procedure on the Box Hill Institute website http://www.boxhill.edu.au/for-students/student-support or by calling Student Life on XXXXXXXXXX, by emailing the Disability liaison service on XXXXXXXXXX or by calling into the Student Life office at Elgar Campus in E3.G56, just near the cafeteria.
Where a student anticipates that a result will be impacted by special circumstances such as ill health or bereavement, application can be made for special consideration. Forms can be accessed from the Student Life office at Elgar Campus in E3.G56 or downloaded at: http://www.boxhill.edu.au/for-students/student-information/forms-and-downloads.
VCE courses: Supplementary exam procedures apply. Please see your VCE Teacher or VCE Coordinator for further discussion.
VU21991 AT1 – An Anatomy of a Cyber Attack
The following criteria will be used for this assessment:
Examine modern network security threats and attacks
Network security architectures is identified
Select group of modern cyber security threats and attacks are examined in detail.
Tools and procedures to mitigate the effects of malware and common network attacks are identified
Using the information from the ABC Widgets Franchise company, you have been approached to provide a briefing report for them to help them make an informed decision regarding improving and hardening their security systems:
Is to develop a briefing report for the company that:
1. Provide an overview of different security architectures ABC Widgets Franchise to deploy. Give some advantages and disadvantages of each solution
2. To describe in detail a typical security threat or attack (examples may include Trojans, Spoofing, Phishing, Spear phishing, Man in the middle, Password attacks, emerging, others)
3. To provide a summary of tools and procedures that can be used to mitigate such attacks
VU21991 Implement network security infrastructure for an organization AT1
Version 2 Jan 2020