List the principles of cyber security

Assignment Help Other Subject
Reference no: EM133082825

ICTCYS613 Utilise design methodologies for security architecture

Assessment Plan

Reasonable Adjustment
Adapted Reasonable Adjustment in teaching, learning and assessment for learners with a disability - November 2010 - Prepared by - Queensland VET Development Centre

Reasonable adjustment in VET is the term applied to modifying the learning environment or making changes to the training delivered to assist a learner with a disability. A reasonable adjustment can be as simple as changing classrooms to be closer to amenities or installing a particular type of software on a computer for a person with vision impairment.
Why make a reasonable adjustment?
We make reasonable adjustments in VET to make sure that learners with a disability have:
• The same learning opportunities as learners without a disability, and
• The same opportunity to perform and complete assessments as those without a disability.
• Reasonable adjustment applied to participation in teaching, learning and assessment activities can include:

• Customising resources and assessment activities within the training package or accredited course
• Modifying the presentation medium
• Learner support
• Use of assistive/adaptive technologies
• Making information accessible both before enrolment and during the course
• Monitoring the adjustments to ensure learners needs continue to be met
Assistive/Adaptive Technologies
Assistive/Adaptive technology means ‘software or hardware that has been specifically designed to assist people with disabilities in carrying out daily activities' (World Wide Web Consortium - W3C). It includes screen readers, magnifiers, voice recognition software, alternative keyboards, devices for grasping, visual alert systems, digital note-takers.
IMPORTANT:
Reasonable adjustment made for collecting learner assessment evidence must not impact on the standard expected by the workplace, as expressed by the relevant unit(s) of competency. For example, if the assessment were gathering evidence of the learner's competency in writing, allowing the learner to complete the assessment verbally would not be a valid assessment method. The method of assessment used by any reasonable adjustment must still meet the competency requirements.

Assessment appeals
If you do not agree with an assessment decision, you can make an assessment appeal as per your RTO's assessment appeals process.
You have the right to appeal the outcome of assessment decisions if they feel they have been dealt with unfairly or have other appropriate grounds for an appeal.
Naming electronic documents
It is important that you name the documents that you create for this Assessment Task in a logical manner.
Each should include:
• Course identification code
• Assessment Task number
• Document title (if appropriate)
• Student name
• Date it was created
Assessment Task Information
This gives you:
• a summary of the assessment task
• information on the resources to be used
• submission requirements
• re-submission opportunities if required
Assessment Task Instructions
These give questions to answer or tasks which are to be completed.
Your answers need to be typed up using software as indicated in the Assessment Task Instructions.
If you are uploading any supporting document with the assessment task, give the document a file name that includes the unit identification number, the task number, your name and the date as per "Naming Electronic Document" standards listed above.

Assessment Task 1
Information for students
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
• review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
• comply with the due date for assessment which your assessor will provide
• adhere with your RTO's submission guidelines
• answer all questions completely and correctly
• submit work which is original and, where necessary, properly referenced
• submit a completed cover sheet with your work
• avoid sharing your answers with other students.

QUESTION 1 List the principles of cyber security.

QUESTION 2 List the principles of security architecture.

QUESTION 3 List four cyber security risks that can result in a business developing security architecture.

QUESTION 4 List three types of documents that would form part of security architecture.

Assessment Task 2

In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.
You will need access to:
• a suitable place to complete activities that replicates an ICT environment including computer and internet access
• ICTCYS613 Simulation Pack or access to information about your own business including its structure, procedures relevant to designing security architecture and relevant data
• your learning resources and other information for reference
• Project Portfolio
Ensure that you:
• review the advice to students regarding responding to written tasks in the IT Works Student User Guide
• comply with the due date for assessment which your assessor will provide
• adhere with your RTO's submission guidelines
• answer all questions completely and correctly
• submit work which is original and, where necessary, properly referenced
• submit a completed cover sheet with your work
• avoid sharing your answers with other students.
Activities
Complete the following activities:

QUESTION 1

Carefully read the following:
This assessment task requires you to design security architecture for a business using specific design methodologies.
This project can be based on the case study business in the ICTCYS613 Simulation Pack or you may like to base this on your own business, or a business you are currently working for or are familiar with. It is important that you can access information about the business including its structure, procedures relevant to designing security architecture and relevant data. Speak to your assessor to get approval if you want to base this on your own business or one you work for.

QUESTION 2
Planning
Make sure you are familiar with the business you are basing this assessment on and have read through the necessary background information and policies and procedures. For the case study business, this is all of the documents included in the ICTCYS613 simulation pack. If it's your own business or a business where you are working or are familiar with, it's important at this step that you have your business or case study approved by your assessor.
Complete Page 4 of your Project Portfolio for this unit.
Read through the requirements of Section 1 and 2 of your Project Portfolio.

QUESTION 3
Security architecture planning
You are now to complete Section 1 of your Project Portfolio.
When you complete Section 1, you need to:
• Analyse and report on the business' security requirements.
• Describe the data types that will be included in the security architecture.
Discuss industry standard design methodologies that can be used for security architecture.
Complete Section 1 of your Project Portfolio.
Submit your Portfolio to your assessor and if approved, you will move to the next step.

QUESTION 4
Security architecture design
You are now to complete Section 2 of your Project Portfolio.
When you complete Section 2, you need to:
• Design the security architecture to meet the business' needs using industry standard design methodologies.
• Demonstrate how your design uses industry standard methodologies and meets requirements.
• Submit all of your documentation associated with the security architecture design and seek feedback.
Complete Section 2 of your Portfolio.

QUESTION 5
Submit your completed Project Portfolio

Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary.

Attachment:- Security architecture.rar

Reference no: EM133082825

Questions Cloud

The united states versus myron piggie : What are the moral and ethical issues of the case? Who are the major stakeholders in this case? What are the major views on the conceptual issues raised by this
What is the differences of etiquette law and religion : What is the differences of etiquette law and religion b with example of each
Asean economic community : How member countries can benefit from ASEAN Economic Community through international and regional trades ?
Merged firm profit-maximizing price : Assume two firms exist in the market, Buckley and Stetler. If they merge, they will have fixed costs of $140,000, marginal costs of $50, and a market share of 6
List the principles of cyber security : List cyber security risks that can result in a business developing security architecture and List the principles of security architecture
Endangering the survival of species : Which of the following establishes international cooperation to prevent international trade from endangering the survival of species?
Operating speed with caltrain : Caltrain is currently in the process of converting from diesel locomotivesto electrification. Electric trains are faster and have no (local) emissions.Assume th
Will joe always take the bet : 1. Joe has a utility function of U(x) = v x 3 . He is offered a gamble that pays him 0 = X = 9 with probability 0.75 and 16 = Y = 9 with probability 0.25. Joe h
Who owns most hospitals : Who owns most hospitals? Who gets the profit when a nonprofit hospital makes money? Can nonprofit hospitals be bought and sold?

Reviews

len3082825

2/9/2022 12:46:49 AM

Attached files to be done You need to answers Q in both files I will check and submit myself online Make sure to deliver me good and plagiarism free solution Also attached all reading material you need in ZIP file

Write a Review

Other Subject Questions & Answers

  Write down a 4 page apa formatted paper by using a minimum

hr performance issues and motivation many hr performance issues result from underlying motivational problems external

  What is the piece saying or trying to say

What has the performer intended? What is the piece saying, or trying to say? What is the relationship between the form or style of this piece and its content? How may it relate to you and your own circumstances?

  When is the correlational research method appropriate

When is the correlational research method appropriate? Describe an example of an actual research study from a credible source or the news that illustrates the use of the correlational method.

  Discuss the impacts that lone wolf terrorism is having

Explain the rise of lone wolf terrorism domestically and internationally. Discuss the impacts that lone wolf terrorism is having on a society.

  Explain incentive plans for increasing efficiency levels

He would like to attempt some incentive plans for increasing efficiency levels of those restaurants which are lagging behind. But, before he initiates this, he would like to make sure that idea will work.

  Discuss the topic of the feminization of poverty

For this assignment I would like you to discuss the topic of the Feminization of Poverty. What does it mean? Why is it important to study and understand?

  Susceptible to these strategies

What types of offenders do you think are most susceptible to these strategies? Explain. If drugs were legalized, operations such as the buy and bust would no longer apply. Generally speaking, do you feel that drugs should be legalized? Why or why not..

  Effective managers stay abreast of current hr

global HRM, labor relations, social media, whistleblower rules, e-HRM/self-service the knowledge economy, outsourcing pros and cons

  List and discuss 5 its technologies

The two images below were discussed in the ITS lecture. Identify what form of communication is shown in each and briefly discuss.

  Briefly describe a data visualization project

Briefly describe a data visualization project (either real or fictional) that might be needed in your workplace. (If you are currently not working).

  Evaluate the authors and apply skepticism to their positions

How can we, as individuals and a society, become more sustainable? What will be easy to change? What is harder to change and why?

  Write about the conflict in nigeria

Write about the conflict in Nigeria in which Boko haram is the main actor. What are the causes, what does boko haram has been fighting for? the beggining of the conflict till today

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd