Information Technology

ICTCYS407 Analyse And Interpret Data

19 April 2023 13:03 PM | UPDATED 1 year ago

ICTCYS407 Analyse And Interpret Data :

For solution: +610482078788

+61482073403

+61482072848

ICTCYS407   Analyse And Interpret Data
ICTCYS407 Analyse And Interpret Data

student assessment tasks
Gather, analyse and interpret threat data

First published 2021

RTO Works
www.rtoworks.com.au

[email protected]

0452 157 557

© 2021 RTO Works

This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as expressed in the RTO Works License Agreement.

The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct. Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any loss, injury or damage arising from such information.

While every effort has been made to achieve strict accuracy in this resource, the publisher would welcome notification of any errors and any suggestions for improvement. Readers are invited to write to us at [email protected].

IT Works is a series of training and assessment resources developed for qualifications within the Information and Communications Technology Training Package.

CONTENTS

Introduction  4

Assessment Task 1: Knowledge Questions  5

Assessment Task 1: Checklist 8

Assessment Task 2: Project Portfolio  9

Assessment Task 2: Checklist 11

Final Results Record  13

Introduction

The assessment tasks for ICTCYS407 Gather, analyse and interpret threat data are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course.

Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the IT Works Student User Guide. The Student User Guide provides important information for you relating to completing assessment successfully.

Assessment for this unit

ICTCYS407 Gather, analyse and interpret threat data describes the skills and knowledge required to gather data from various sources, analyse, and interpret information for threats, inconsistencies and discrepancies.

For you to be assessed as competent, you must successfully complete two assessment tasks:

  • Assessment Task 1: Knowledge questions – You must answer all questions correctly.
  • Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio.

Assessment Task 1: Knowledge Questions

Information for students

Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:

  • review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTO’s submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.
iAssessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedthe maximum time allowed for completing this assessment taskwhether or not this task is open-book. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Questions

Provide answers to all of the questions below:

  1. List an example of software that can be used to recognise threats to a network.
  2. For each of the following data sources, give an example of the type of data that can be collected.
 Data sourceType of data
  
  
  
  
  • Outline a basic troubleshooting process that can be used to identify and assess cyber security threats.
  • Describe the four key principles of network and cyber security.
  • For each of the following types of cyber security attacks, list the objective of the attack and its potential impact on a business.
Type of attackDescriptionImpact on business
Denial-of-service attack (DDOS)  
SQL injection (SQLi)  
Cross-site scripting (XSS) attacks  
Scripted attacks   
Hardware attacks  
Attacks against Wi Fi  
  • Answer all of the following questions in relation to workplace policies and procedures for gathering, analysing and interpreting threat data.
Workplace policy and procedure questionAnswer
Give an example of how findings and recommendations from threat data gathering and analysis might be reported at work.  
Give an example of security equipment that could be referred to in a workplace policy and procedure. 
Give an example of a data source for threats that could be referred to in a workplace policy and procedure. 
List a method  that can be in included in an workplace policy and procedure for gathering threat data. 
Describe a step by step process for obtaining threat data and analysing the results  

Assessment Task 1: Checklist

Student’s name:
Did the student provide a sufficient and clear answer that addresses the suggested answer for the following?Completed successfully?Comments
YesNo 
Question 1   
Question 2   
Question 3   
Question 4   
Question 5   
Question 6   
Task outcome:SatisfactoryNot satisfactory
Assessor signature: 
Assessor name: 
Date: 


Assessment Task 2: Project Portfolio

Information for students

In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.

You will need access to:

  • a suitable place to complete activities that replicates a business environment including a meeting space and computer and internet access
  • your learning resources and other information for reference
  • a suitable place to complete activities that replicates an ICT environment including hardware, software (including data recognition software), security devices, digital devices and internet access (note simulated software can also be used)
  • analytic platform for analysing threat data and associated instructions for use
  • ICTCYS407 Simulation Pack or own workplace policies and procedures relevant to gathering, analysing and interpreting threat data
  • Project Portfolio template.

Ensure that you:

  • review the advice to students regarding responding to written tasks in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTO’s submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.
iAssessment information
Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedhow your assessment should be submitted. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix B of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Activities

Complete the following activities:

  1. Carefully read the following:
This assessment task requires to you gather, analyse and interpret threat data to support and prevent cyber security threats. You will complete this task using your own computer and router linked to a network such as a WLAN or WAN. Your assessor will provide you with further guidance. You will be collecting evidence for this unit in a Project Portfolio. The steps you need to take are outlined below. Before you begin, complete page 4 of your Project Portfolio.
  • Prepare to gather threat data.
You are required to prepare to gather threat data. This involves: Providing information on the network infrastructure and the security device/s used, as well as the sources of data.Identifying and reporting on legislative requirements and policies and procedures that apply to  gathering, analysing and interpreting threat data.Identifying and discussing the data that you will collect and your strategy for gathering, analysing and interpreting this data.
Complete Section 1 of your Project Portfolio. Submit your Portfolio to your assessor and if approved, you will move to the next step.
  • Gather, analyse and interpret threat data.
You are required to gather threat data following the procedures in the Simulation Pack or your own workplace’s procedures. Using the identified security device, collect information from alerts, logs and reported events and create a dataset. Once you have collected all of the data, run your data through the analytic platform and review and report on the results. Work on Section 2 of your Portfolio.
  • Submit your completed Project Portfolio 
Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary. Submit to your assessor for marking.

Assessment Task 2: Checklist

Student’s name:
Did the student:Completed successfully?Comments
YesNo 
Gather, log and create dataset from a security device, including documenting basic router, firewalls and systems information?   
Identify and report on legislative requirements and workplace policies and procedures relevant to gathering, analysing and interpreting threat data?   
Identify the security equipment on a network, as well as data sources?   
Discuss and confirm data log requirements and strategy to process data?   
Follow workplace policies and procedures to collect information from alerts, logs and reported events and create a dataset?   
Ingest data logs into analytic platform following instructions for the platform?   
Analyse results and report on reliability and consistency of data provided including checking for false positive and false negative results?   
Detect and describe at least three different inconsistencies and/or discrepancies in the data?   
Discuss and review threat data and results?   
Discuss and assess identified threats, risks and their likelihood of occurrence and impacts of risks?   
Suggest and confirm lessons learnt, action steps, recommendations and mitigation strategies?   
Document results, findings and recommendations regarding threat data in a report?   
Distribute report and then file according to workplace policies and procedures?   
Task outcome:SatisfactoryNot satisfactory
Assessor signature: 
Assessor name: 
Date: 
ICTCYS407 Analyse And Interpret Data

Final Results Record

Student name: 
Assessor name: 
Date 

Final assessment results

TaskTypeResult
SatisfactoryUnsatisfactoryDid not submit
Assessment Task 1Knowledge questionsSUDNS
Assessment Task 2Project PortfolioSUDNS
Overall unit results CNYC 
ICTCYS407 Analyse And Interpret Data

Feedback

Student signature: ___________________________________________   Date: _________________

Assessor signature:   _________________________________________   Date:  _________________

Visit:https://auspali.info/

Also visit:https://www.notesnepal.com/archives/767

For solution: +610482078788

+61482073403

+61482072848