ICTCYS407 Analyse And Interpret Data :
For solution: +610482078788
+61482073403
+61482072848
student assessment tasks |
Gather, analyse and interpret threat data |
First published 2021
RTO Works
www.rtoworks.com.au
0452 157 557
© 2021 RTO Works
This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as expressed in the RTO Works License Agreement.
The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct. Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any loss, injury or damage arising from such information.
While every effort has been made to achieve strict accuracy in this resource, the publisher would welcome notification of any errors and any suggestions for improvement. Readers are invited to write to us at [email protected].
IT Works is a series of training and assessment resources developed for qualifications within the Information and Communications Technology Training Package.
CONTENTS
Assessment Task 1: Knowledge Questions 5
Assessment Task 1: Checklist 8
Assessment Task 2: Project Portfolio 9
Assessment Task 2: Checklist 11
The assessment tasks for ICTCYS407 Gather, analyse and interpret threat data are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course.
Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the IT Works Student User Guide. The Student User Guide provides important information for you relating to completing assessment successfully.
Assessment for this unit
ICTCYS407 Gather, analyse and interpret threat data describes the skills and knowledge required to gather data from various sources, analyse, and interpret information for threats, inconsistencies and discrepancies.
For you to be assessed as competent, you must successfully complete two assessment tasks:
- Assessment Task 1: Knowledge questions – You must answer all questions correctly.
- Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio.
Assessment Task 1: Knowledge Questions
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
- review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
- comply with the due date for assessment which your assessor will provide
- adhere with your RTO’s submission guidelines
- answer all questions completely and correctly
- submit work which is original and, where necessary, properly referenced
- submit a completed cover sheet with your work
- avoid sharing your answers with other students.
i | Assessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedthe maximum time allowed for completing this assessment taskwhether or not this task is open-book. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. |
Questions
Provide answers to all of the questions below:
- List an example of software that can be used to recognise threats to a network.
- For each of the following data sources, give an example of the type of data that can be collected.
Data source | Type of data |
- Outline a basic troubleshooting process that can be used to identify and assess cyber security threats.
- Describe the four key principles of network and cyber security.
- For each of the following types of cyber security attacks, list the objective of the attack and its potential impact on a business.
Type of attack | Description | Impact on business |
Denial-of-service attack (DDOS) | ||
SQL injection (SQLi) | ||
Cross-site scripting (XSS) attacks | ||
Scripted attacks | ||
Hardware attacks | ||
Attacks against Wi Fi |
- Answer all of the following questions in relation to workplace policies and procedures for gathering, analysing and interpreting threat data.
Workplace policy and procedure question | Answer |
Give an example of how findings and recommendations from threat data gathering and analysis might be reported at work. | |
Give an example of security equipment that could be referred to in a workplace policy and procedure. | |
Give an example of a data source for threats that could be referred to in a workplace policy and procedure. | |
List a method that can be in included in an workplace policy and procedure for gathering threat data. | |
Describe a step by step process for obtaining threat data and analysing the results |
Student’s name: | ||||
Did the student provide a sufficient and clear answer that addresses the suggested answer for the following? | Completed successfully? | Comments | ||
Yes | No | |||
Question 1 | ||||
Question 2 | ||||
Question 3 | ||||
Question 4 | ||||
Question 5 | ||||
Question 6 | ||||
Task outcome: | Satisfactory | Not satisfactory | ||
Assessor signature: | ||||
Assessor name: | ||||
Date: | ||||
Assessment Task 2: Project Portfolio
Information for students
In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.
You will need access to:
- a suitable place to complete activities that replicates a business environment including a meeting space and computer and internet access
- your learning resources and other information for reference
- a suitable place to complete activities that replicates an ICT environment including hardware, software (including data recognition software), security devices, digital devices and internet access (note simulated software can also be used)
- analytic platform for analysing threat data and associated instructions for use
- ICTCYS407 Simulation Pack or own workplace policies and procedures relevant to gathering, analysing and interpreting threat data
- Project Portfolio template.
Ensure that you:
- review the advice to students regarding responding to written tasks in the IT Works Student User Guide
- comply with the due date for assessment which your assessor will provide
- adhere with your RTO’s submission guidelines
- answer all questions completely and correctly
- submit work which is original and, where necessary, properly referenced
- submit a completed cover sheet with your work
- avoid sharing your answers with other students.
i | Assessment information |
Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedhow your assessment should be submitted. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix B of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that. |
Activities
Complete the following activities:
- Carefully read the following:
This assessment task requires to you gather, analyse and interpret threat data to support and prevent cyber security threats. You will complete this task using your own computer and router linked to a network such as a WLAN or WAN. Your assessor will provide you with further guidance. You will be collecting evidence for this unit in a Project Portfolio. The steps you need to take are outlined below. Before you begin, complete page 4 of your Project Portfolio. |
- Prepare to gather threat data.
You are required to prepare to gather threat data. This involves: Providing information on the network infrastructure and the security device/s used, as well as the sources of data.Identifying and reporting on legislative requirements and policies and procedures that apply to gathering, analysing and interpreting threat data.Identifying and discussing the data that you will collect and your strategy for gathering, analysing and interpreting this data. | |
Complete Section 1 of your Project Portfolio. Submit your Portfolio to your assessor and if approved, you will move to the next step. |
- Gather, analyse and interpret threat data.
You are required to gather threat data following the procedures in the Simulation Pack or your own workplace’s procedures. Using the identified security device, collect information from alerts, logs and reported events and create a dataset. Once you have collected all of the data, run your data through the analytic platform and review and report on the results. Work on Section 2 of your Portfolio. |
- Submit your completed Project Portfolio
Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary. Submit to your assessor for marking. |
Student’s name: | |||||
Did the student: | Completed successfully? | Comments | |||
Yes | No | ||||
Gather, log and create dataset from a security device, including documenting basic router, firewalls and systems information? | |||||
Identify and report on legislative requirements and workplace policies and procedures relevant to gathering, analysing and interpreting threat data? | |||||
Identify the security equipment on a network, as well as data sources? | |||||
Discuss and confirm data log requirements and strategy to process data? | |||||
Follow workplace policies and procedures to collect information from alerts, logs and reported events and create a dataset? | |||||
Ingest data logs into analytic platform following instructions for the platform? | |||||
Analyse results and report on reliability and consistency of data provided including checking for false positive and false negative results? | |||||
Detect and describe at least three different inconsistencies and/or discrepancies in the data? | |||||
Discuss and review threat data and results? | |||||
Discuss and assess identified threats, risks and their likelihood of occurrence and impacts of risks? | |||||
Suggest and confirm lessons learnt, action steps, recommendations and mitigation strategies? | |||||
Document results, findings and recommendations regarding threat data in a report? | |||||
Distribute report and then file according to workplace policies and procedures? | |||||
Task outcome: | Satisfactory | Not satisfactory | |||
Assessor signature: | |||||
Assessor name: | |||||
Date: | |||||
Student name: | |
Assessor name: | |
Date |
Final assessment results
Task | Type | Result | ||
Satisfactory | Unsatisfactory | Did not submit | ||
Assessment Task 1 | Knowledge questions | S | U | DNS |
Assessment Task 2 | Project Portfolio | S | U | DNS |
Overall unit results | C | NYC |
Student signature: ___________________________________________ Date: _________________
Assessor signature: _________________________________________ Date: _________________
Visit:https://auspali.info/
Also visit:https://www.notesnepal.com/archives/767
For solution: +610482078788
+61482073403
+61482072848
YOUR COMMENT