Information Technology

ICTCYS610 Protect Infrastructure For Organisations

18 April 2023 12:34 PM | UPDATED 1 year ago

ICTCYS610 Protect Infrastructure For Organisations :

For solution: +610482078788

+61482073403

+61482072848

ICTCYS610 Protect  Infrastructure For Organisations
ICTCYS610 Protect Infrastructure For Organisations
ICTCYS610 Protect critical infrastructure for organisations

student assessment tasks
Protect critical infrastructure for organisations

This resource is copyright. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted under the Copyright Act 1968, no part may be reproduced by any process without written permission as expressed in the RTO Works License Agreement.

The information contained in this resource is, to the best of the project team’s and publisher’s knowledge true and correct. Every effort has been made to ensure its accuracy, but the project team and publisher do not accept responsibility for any loss, injury or damage arising from such information.

While every effort has been made to achieve strict accuracy in this resource, the publisher would welcome notification of any errors and any suggestions for improvement.

IT Works is a series of training and assessment resources developed for qualifications within the Information and Communications Technology Training Package.

CONTENTS

Introduction  4

Assessment Task 1: Knowledge Questions  5

Assessment Task 1: Checklist 7

Assessment Task 2: Project Portfolio  8

Assessment Task 2: Checklist 12

Final Results Record  15

Introduction

The assessment tasks for ICTCYS610 Protect critical infrastructure for organisations are outlined in the assessment plan below. These tasks have been designed to help you demonstrate the skills and knowledge that you have learnt during your course.

Please ensure that you read the instructions provided with these tasks carefully. You should also follow the advice provided in the IT Works Student User Guide. The Student User Guide provides important information for you relating to completing assessment successfully.

Assessment for this unit

ICTCYS610 Protect critical infrastructure for organisations describes the skills and knowledge required to analyse an organisation’s critical cyber operations and develop and implement a critical protections strategy that addresses the needs of the organisation.

For you to be assessed as competent, you must successfully complete two assessment tasks:

  • Assessment Task 1: Knowledge questions – You must answer all questions correctly.
  • Assessment Task 2: Project – You must work through a range of activities and complete a project portfolio.

Assessment Task 1: Knowledge Questions

Information for students

Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:

  • review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTO’s submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.
iAssessment information Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedthe maximum time allowed for completing this assessment taskwhether or not this task is open-book. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix C of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Questions

Provide answers to all of the questions below:

  1. List three types of assets that could be considered to be critical infrastructure.
  2. Explain each aspect of the best practice framework for protecting critical infrastructure.
Identify 
Protect 
Detect 
Respond 
Recover 
  • Complete the following table regarding legislative requirements applicable to researching, analysing and developing critical infrastructure protection policies.
Legislative requirementHow it is applicable to researching and/or analysing and/or developing critical infrastructure protection policies
Privacy Act 1988 
The Criminal Code Act 1995   

Assessment Task 1: Checklist

Student’s name:
Did the student provide a sufficient and clear answer that addresses the suggested answer for the following?Completed successfully?Comments
YesNo 
Question 1   
Question 2   
Question 3   
Task outcome:SatisfactoryNot satisfactory
Assessor signature: 
Assessor name: 
Date: 


Assessment Task 2: Project Portfolio

Information for students

In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.

You will need access to:

  • a suitable place to complete activities that replicates an IT environment including devices connected to the Internet and relevant software
  • your learning resources and other information for reference
  • Project Portfolio template
  • Simulation Pack (if you need a case study) or access to a business operating environment, network and systems, as well as a style guide
  • Critical Infrastructure Protection Plan Template.

Ensure that you:

  • review the advice to students regarding responding to written tasks in the IT Works Student User Guide
  • comply with the due date for assessment which your assessor will provide
  • adhere with your RTO’s submission guidelines
  • answer all questions completely and correctly
  • submit work which is original and, where necessary, properly referenced
  • submit a completed cover sheet with your work
  • avoid sharing your answers with other students.
iAssessment information
Information about how you should complete this assessment can be found in Appendix A of the IT Works Student User Guide.Refer to the appendix for information on: where this task should be completedhow your assessment should be submitted. Note: You must complete and submit an assessment cover sheet with your work. A template is provided in Appendix B of the Student User Guide. However, if your RTO has provided you with an assessment cover sheet, please ensure that you use that.

Activities

Complete the following activities:

  1. Carefully read the following:
This project requires you to analyse an organisation’s critical assets and develop and implement a critical infrastructure protection plan that addresses the organisation’s needs.  
 You can complete this project based on the case study organisation in the ICTCYS610 Simulation Pack or you can base it on an organisation that you are familiar with or working for. If you choose to complete the project based on a business of your choice, it is important that you can access the organisation’s operating environment, networks and systems, as well as devices connected to the Internet and relevant software. You will also be able to access the organisation’s style guide to follow for written documentation as per the assessment activities indicated. Speak to your assessor to get approval if you want to base this on an organisation of your choice.
 You will be collecting evidence for this unit in a Project Portfolio. The steps you need to take are outlined below.
  • Preparation
Make sure you are familiar with the organisation you are basing this assessment on and have read through the necessary background information. For the case study organisation, this is all of the documents included in the ICTCYS610 Simulation Pack. If it’s your own organisation, it’s important that you have this approved by your assessor. Complete Page 4 of your Project Portfolio for this unit. Read through the requirements of Section 1 and 2 of your Project Portfolio which include detailed guidance relevant to all the assessment activities. Remember that you need to follow style guidelines in presenting your work. If you are completing this for the case study business this will be the style guidelines in the Simulation Pack. If you are completing this for your own business, please also follow the style guidelines in the Simulation Pack.
  • Review ICT system and threats and risks
You are now to complete Section 1 of your Project Portfolio by researching the organisation’s critical infrastructure needs and developing a critical protection strategy. This involves: Researching and reporting on critical infrastructure protection needs.Analysing and reporting on any existing critical infrastructure protection plan and assessing its effectiveness, as well as its alignment to the organisation’s requirements.  Identifying and reporting on the organisation’s system, critical assets and how networks are currently segmented.Identifying and reporting on legislation that applies to the organisation, specifically in terms of critical protection. Determining and reporting on the required level of protection for critical infrastructure, as well as vulnerabilities and risks, as well as risk mitigation strategies.  Consolidating your research findings and providing a mapping of business critical processes.Developing and documenting a critical infrastructure protection plan using the template provided.
Complete Section 1 of your Project Portfolio and submit this to your assessor. Your assessor will also provide you with feedback on your plan which you must review and implement in the following activity. Detailed instructions are provided in your Portfolio.
  • Implement and test the critical infrastructure protection plan
Next complete Section 2 of your Project Portfolio by implementing and testing your critical infrastructure protection plan. This involves: Backing up data as per the instructions in your Portfolio.Securing at least two devices of your choice.Applying software patches.Implementing additional protection plan requirements.  Testing the measures you have implemented.Documenting results.Identifying and documenting additional protection plan requirements based on testing.
Complete Section 2 of your Project Portfolio and submit this to your assessor. Your assessor will also provide you with feedback which you must review and respond to. Detailed instructions are provided in your Portfolio.
  • Submit your completed Project Portfolio.
Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary. Submit to your assessor for marking.

Assessment Task 2: Checklist

Student’s name:
Did the student:Completed successfully?Comments
YesNo 
Research and report on the organisation’s need for critical infrastructure protection and document findings following style guide requirements?   
Analyse and report on the organisation’s existing critical infrastructure protection plan?   
Determine and report on how effective the existing critical infrastructure protection plan is in terms of the organisation’s requirements, as well as how well it aligns to the organisation’s requirements?   
Identify and report on the organisation’s operational systems, critical assets and existing segmentation?   
Identify and report on legislative requirements that the organisation needs to take into account with regards to critical protection of infrastructure?   
Determine and report on the level of protection required, as well as vulnerabilities, risks and risk mitigation strategies?   
Consolidate all research findings and map critical processes as relevant to critical protection?   
Develop and document critical infrastructure protection plan using the critical protection plan template?   
Submit protection plan and seek feedback?   
Respond to feedback on the critical protection plan?   
Backup data following required procedures?   
Secure devices as per the protection plan and to meet technical requirements for securing devices?   
Implement network segmentation as per protection plan and to meet technical requirements for network segmentation?   
Apply software patches as per technical requirements for applying software patches?   
Implement additional protection plan requirements and asset management processes?   
Test the deployment of protection plan as per the required procedures?   
Obtain and analyse results from the deployment of protection plan as per the required procedures?   
Determine and document additional protection methods for critical infrastructure protection?   
Submit all documentation and seek feedback?   
Respond to feedback provided?   
Prepare complex workplace documentation following the style guidelines provided?   
Task outcome:SatisfactoryNot satisfactory
Assessor signature: 
Assessor name: 
Date: 

Final Results Record

Student name: 
Assessor name: 
Date 

Final assessment results

TaskTypeResult
SatisfactoryUnsatisfactoryDid not submit
Assessment Task 1Knowledge questionsSUDNS
Assessment Task 2Project PortfolioSUDNS
Overall unit results CNYC 

Feedback

Student signature: ___________________________________________   Date: _________________

Assessor signature:   _________________________________________   Date:  _________________

Visit:https://auspali.info/

Also visit:https://www.notesnepal.com/archives/767

For solution: +610482078788

+61482073403

+61482072848