ICTNWK502 Instructions V2.0

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ASSESSMENT INSTRUCTIONS

ICTNWK502 Implement secure encryption


technologies
Assessment Summary

Read all the instructions below before attempting the assessment task. Assessment tasks are tools
used to determine if you have the knowledge and skills to complete tasks to industry standards within
the workplace. Your trainer/assessor will help you throughout this task and it is your responsibility to
provide enough evidence to justify a competent decision by the trainer/assessor. If you do not
understand the questions or what is required, ask your trainer/assessor for assistance. For group
assessments, all students are to contribute to the assessment tasks. You are allowed to work in groups
up to a maximum of four people. You are to complete all tasks by the due date and assessments must
have a coversheet attached. If you think you do not have enough time to complete the tasks by the
due date, discuss with the trainer/assessor the reasons of why you cannot submit on time.

Writing your responses

When answering questions, ensure that your answers are detailed enough to so the assessor can draw
a conclusion that you have the knowledge and/or skills to demonstrate competency. Handwritten
answers must be written in blue or black pen. When producing reports, ensure that your project has
a title page, table of contents, page numbers, reference list, ensuring that your answers thoroughly
match the questions asked. Answer all questions in your own words to avoid plagiarism. Plagiarism is
copying someone else’s work or ideas and saying that it your own work. Sources of work must be
properly referenced, outlining the source of your ideas. Penalties may include having to resubmit the
assessment task again, repeating the Unit of competency, or for repeat plagiarism, expulsion from
Abbey Business College.

Marking of Assessments

On submission of your assessment will be marked for a result of either Satisfactory (S) or Not Yet
Satisfactory (NYS). If you receive a NYS result, you will be asked to redo the tasks again. To achieve a
competent result with this unit, all tasks need to be completed and marked as satisfactory. Your
trainer/assessor will provide feedback to you on each task, outlining where you must improve to
achieve a Satisfactory (S) result. When all tasks are marked as Satisfactory (S), you will receive a result
of Competent (C) for this unit otherwise, you will be marked Not Yet Competent (NYC). Assessments
submitted to the trainer/assessor after the due date may not be accepted, and you may have to a
resubmission fee.

Unit of competency application


This unit describes the skills and knowledge required to ensure secure file encryption is selected,
implemented and monitored on a computer network or local environment.

It applies to individuals working as information and communications technology (ICT) professionals


who may select, implement and monitor a secure encryption environment in any size enterprise.

ICTNWK502 Implement secure encryption technologies 2|Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 Jun 2020
Elements and Performance Criteria

Elements Performance Criteria


Elements describe Performance criteria describe the performance needed to demonstrate
the essential achievement of the element.
outcomes
1. Determine
1.1 Analyse enterprise data security requirements
encryption
1.2 Create a new or review an existing security plan to determine
methods
appropriate encryption methods
1.3 Review a range of encryption technologies and rank the most appropriate
options
1.4 Assess the costs associated with each encryption option
1.5 Document encryption options and costs, and forward to appropriate
person for decision
2. Implement
2.1 Apply encryption technologies to the enterprise system
encryption
2.2 Analyse effect of encryption technologies on user roles and
responsibilities
2.3 Inform user of new encryption technologies and the effect it has on their
responsibilities
3. Monitor
3.1 Analyse implementation of the encryption technologies, confirming
encryption
function and performance
3.2 Review help desk records for problems concerning implementation and
take appropriate action
3.3 Review system logs for encryption issues and compromises
3.4 Document encryption issues and compromises, and notify appropriate
person

ICTNWK502 Implement secure encryption technologies 3|Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 Jun 2020
Foundation Skills
Performance Criteria Description
Skill
1.1, 3.2 • Gathers, interprets and analyses technical data
Reading
to determine security requirements and help
desk records to interpret technical
compromises
1.1, 1.3, 1.5, 3.4 • Prepares workplace documentation that
Writing
incorporates an evaluation of technical
information and specialised and cohesive
language in a format and style appropriate to a
specific audience
2.3, 3.4 • Articulates requirements and responsibilities
Oral
Communication clearly and distinctively, using technical
language appropriate to audience and
environment
1.4 • Uses mathematical formulas and calculations
Numeracy
to undertake a cost-benefit analysis
1.1 • Recognises and follows explicit and implicit
Navigate the
world of work protocols, and meets expectations associated
with own role
1.5 • Selects the appropriate form, channel and
Interact with
others mode of communication for a specific purpose
relevant to own role
1.3, 2.1, 2.2, 3.1-3.3 • Uses a combination of formal, logical planning
Get the work
done processes and an increasingly intuitive
understanding of context to determine data
security threats, risks and countermeasures
• Manages and maintains data securely and
actively monitors technology, notifying others if
security becomes compromised
• Understands the purposes, specific functions
and key features of common digital systems
and tools, and operates them effectively to
complete routine tasks
• Initiates standard procedures when responding
to familiar problems to troubleshoot, debug
and correct connectivity and security issues

Performance Evidence

Evidence of the ability to:

• analyse enterprise data security requirements


• create or review existing security plan to determine the appropriate encryption methods

ICTNWK502 Implement secure encryption technologies 4|Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 Jun 2020
• rank and document appropriate encryption methods
• implement encryption systems and inform users of any impacts
• monitor and document encryption issues and compromises and notify appropriate person.

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

• explain certificate related infrastructure (certificate authorities, registration authorities,


repository services)
• summarise common asymmetric key algorithms and their usage
• explain common symmetric key algorithms and their usage, such as:
o advanced encryption standard (AES)
o data encryption standard (DES)
o triple data encryption algorithm (triple DES)
o Blowfish
• explain encryption strength
• summarise various encryption types, including public key, secret key, hash key
• summarise the functions and features of:
o access control permissions
o digital signatures
o symmetric encryption, asymmetric encryption and one-way encryption
o timestamps
• explain one-way message digests, such as message digest algorithm 5 (MD5) and secure
hash algorithm (SHA)
• explain public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard
(GnuPG)
• outline replay security
• outline possible sources of security threats, including eavesdropping, data interception, data
corruption, data falsification and authentication issues
• explain transmission control protocol or internet protocol (TCP/IP) protocols and
applications
• summarise security problems and challenges that arise from organisational issues
• outline wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected
access 2 (WPA2).

What happens if your result is ‘Not Yet Competent’ for one or more assessment tasks?

The assessment process is designed to answer the question “has the participant satisfactorily
demonstrated competence yet?” If the answer is “Not yet”, then we work with you to see how we
can get there.

ICTNWK502 Implement secure encryption technologies 5|Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 Jun 2020
In the case that one or more of your assessments has been marked ‘NYC’, your Trainer will provide
you with the necessary feedback and guidance, in order for you to resubmit/redo your assessment
task(s).

What if you disagree on the assessment outcome?

You can appeal against a decision made in regard to an assessment of your competency. An appeal
should only be made if you have been assessed as ‘Not Yet Competent’ against specific competency
standards and you feel you have sufficient grounds to believe that you are entitled to be assessed as
competent.

You must be able to adequately demonstrate that you have the skills and experience to be able to
meet the requirements of the unit you are appealing against the assessment of.

You can request a form to make an appeal and submit it to your Trainer, the Course Coordinator, or
an Administration Officer. The RTO will examine the appeal and you will be advised of the outcome
within 14 days. Any additional information you wish to provide may be attached to the form.

What if I believe I am already competent before training?

If you believe you already have the knowledge and skills to be able to demonstrate competence in
this unit, speak with your Trainer, as you may be able to apply for Recognition of Prior Learning
(RPL).

Credit Transfer

Credit transfer is recognition for study you have already completed. To receive Credit Transfer, you
must be enrolled in the relevant program. Credit Transfer can be granted if you provide the RTO with
certified copies of your qualifications, a Statement of Attainment or a Statement of Results along
with Credit Transfer Application Form. (For further information please visit Credit Transfer Policy)

ICTNWK502 Implement secure encryption technologies 6|Page


Abbey College Australia
National Provider No. 91136| CRICOS Registration No. 02658G
Version V2.0 Jun 2020

You might also like