Reference no: EM133082825
ICTCYS613 Utilise design methodologies for security architecture
Assessment Plan
Reasonable Adjustment
Adapted Reasonable Adjustment in teaching, learning and assessment for learners with a disability - November 2010 - Prepared by - Queensland VET Development Centre
Reasonable adjustment in VET is the term applied to modifying the learning environment or making changes to the training delivered to assist a learner with a disability. A reasonable adjustment can be as simple as changing classrooms to be closer to amenities or installing a particular type of software on a computer for a person with vision impairment.
Why make a reasonable adjustment?
We make reasonable adjustments in VET to make sure that learners with a disability have:
• The same learning opportunities as learners without a disability, and
• The same opportunity to perform and complete assessments as those without a disability.
• Reasonable adjustment applied to participation in teaching, learning and assessment activities can include:
• Customising resources and assessment activities within the training package or accredited course
• Modifying the presentation medium
• Learner support
• Use of assistive/adaptive technologies
• Making information accessible both before enrolment and during the course
• Monitoring the adjustments to ensure learners needs continue to be met
Assistive/Adaptive Technologies
Assistive/Adaptive technology means ‘software or hardware that has been specifically designed to assist people with disabilities in carrying out daily activities' (World Wide Web Consortium - W3C). It includes screen readers, magnifiers, voice recognition software, alternative keyboards, devices for grasping, visual alert systems, digital note-takers.
IMPORTANT:
Reasonable adjustment made for collecting learner assessment evidence must not impact on the standard expected by the workplace, as expressed by the relevant unit(s) of competency. For example, if the assessment were gathering evidence of the learner's competency in writing, allowing the learner to complete the assessment verbally would not be a valid assessment method. The method of assessment used by any reasonable adjustment must still meet the competency requirements.
Assessment appeals
If you do not agree with an assessment decision, you can make an assessment appeal as per your RTO's assessment appeals process.
You have the right to appeal the outcome of assessment decisions if they feel they have been dealt with unfairly or have other appropriate grounds for an appeal.
Naming electronic documents
It is important that you name the documents that you create for this Assessment Task in a logical manner.
Each should include:
• Course identification code
• Assessment Task number
• Document title (if appropriate)
• Student name
• Date it was created
Assessment Task Information
This gives you:
• a summary of the assessment task
• information on the resources to be used
• submission requirements
• re-submission opportunities if required
Assessment Task Instructions
These give questions to answer or tasks which are to be completed.
Your answers need to be typed up using software as indicated in the Assessment Task Instructions.
If you are uploading any supporting document with the assessment task, give the document a file name that includes the unit identification number, the task number, your name and the date as per "Naming Electronic Document" standards listed above.
Assessment Task 1
Information for students
Knowledge questions are designed to help you demonstrate the knowledge which you have acquired during the learning phase of this unit. Ensure that you:
• review the advice to students regarding answering knowledge questions in the IT Works Student User Guide
• comply with the due date for assessment which your assessor will provide
• adhere with your RTO's submission guidelines
• answer all questions completely and correctly
• submit work which is original and, where necessary, properly referenced
• submit a completed cover sheet with your work
• avoid sharing your answers with other students.
QUESTION 1 List the principles of cyber security.
QUESTION 2 List the principles of security architecture.
QUESTION 3 List four cyber security risks that can result in a business developing security architecture.
QUESTION 4 List three types of documents that would form part of security architecture.
Assessment Task 2
In this task, you are required to demonstrate your skills and knowledge by working through a number of activities and completing and submitting a project portfolio.
You will need access to:
• a suitable place to complete activities that replicates an ICT environment including computer and internet access
• ICTCYS613 Simulation Pack or access to information about your own business including its structure, procedures relevant to designing security architecture and relevant data
• your learning resources and other information for reference
• Project Portfolio
Ensure that you:
• review the advice to students regarding responding to written tasks in the IT Works Student User Guide
• comply with the due date for assessment which your assessor will provide
• adhere with your RTO's submission guidelines
• answer all questions completely and correctly
• submit work which is original and, where necessary, properly referenced
• submit a completed cover sheet with your work
• avoid sharing your answers with other students.
Activities
Complete the following activities:
QUESTION 1
Carefully read the following:
This assessment task requires you to design security architecture for a business using specific design methodologies.
This project can be based on the case study business in the ICTCYS613 Simulation Pack or you may like to base this on your own business, or a business you are currently working for or are familiar with. It is important that you can access information about the business including its structure, procedures relevant to designing security architecture and relevant data. Speak to your assessor to get approval if you want to base this on your own business or one you work for.
QUESTION 2
Planning
Make sure you are familiar with the business you are basing this assessment on and have read through the necessary background information and policies and procedures. For the case study business, this is all of the documents included in the ICTCYS613 simulation pack. If it's your own business or a business where you are working or are familiar with, it's important at this step that you have your business or case study approved by your assessor.
Complete Page 4 of your Project Portfolio for this unit.
Read through the requirements of Section 1 and 2 of your Project Portfolio.
QUESTION 3
Security architecture planning
You are now to complete Section 1 of your Project Portfolio.
When you complete Section 1, you need to:
• Analyse and report on the business' security requirements.
• Describe the data types that will be included in the security architecture.
Discuss industry standard design methodologies that can be used for security architecture.
Complete Section 1 of your Project Portfolio.
Submit your Portfolio to your assessor and if approved, you will move to the next step.
QUESTION 4
Security architecture design
You are now to complete Section 2 of your Project Portfolio.
When you complete Section 2, you need to:
• Design the security architecture to meet the business' needs using industry standard design methodologies.
• Demonstrate how your design uses industry standard methodologies and meets requirements.
• Submit all of your documentation associated with the security architecture design and seek feedback.
Complete Section 2 of your Portfolio.
QUESTION 5
Submit your completed Project Portfolio
Make sure you have completed all sections of your Project Portfolio, answered all questions, provided enough detail as indicated and proofread for spelling and grammar as necessary.
Attachment:- Security architecture.rar