Sunteți pe pagina 1din 6

Unit Assessment Guide

Unit details
Unit Code: ICTNWK403

Unit name: Manage network and data integrity

Unit purpose This unit describes the skills and knowledge required to lead the development of asset
protection processes, determining threats and implementing controls to mitigate risk.

It applies to individuals working as middle managers including information security


managers, network engineers and network technicians who are responsible for
implementing and managing the organisational disaster recovery and asset protection
policy and procedures.

Elements and For further information about this unit go to:


performance criteria https://training.gov.au/Training/Details/ICTNWK403

Unit outcome This unit is not graded. Your result will be recorded as:

o achieved competence (AC) or not competent (NC).

Pre-requisite / Co- Nil


requisite units

Assessment plan
To demonstrate competence in this unit, you must successfully complete each of the following assessment events:

1. Event 1 Report - Network security management

ICTNWK403_UAG_v1 Created: 19/08/15 Revised: 6/10/15 Page 1 of 6


Unit Assessment Guide
Assessment conditions

Submission dates Submission of assessment events are flexible to your own personal needs. You should
discuss a timeline with your facilitator in order to determine suitable dates to submit each
assessment event for marking.

Submission instructions Your assessment events must be submitted online via the TAFEnow website.

o Complete each of your assessment events and save your files with the event name
and your own name – for example: Event1_john_smith.

o Upload your assessment event files and any other additional attachments to the
space provided in the TAFEnow online learning platform.

Student is required to To complete this assessment, you will need to provide:


provide materials and
equipment o A personal computer with internet access

TAFEnow is required to Nil


provide material and
equipment

Additional resources Nil

Facilitator support and There is no facilitator supervision required for these assessment events. If you are unclear
supervision about any aspect of the assessment please contact your facilitator for guidance.

Student collaboration Student collaboration is not permitted.

Assessment attempts You have two attempts on each event.

General information For general information relating to assessment procedures at TAFEnow refer to

http://tafenow.com.au/aboutassessment

Facilitator information (Facilitator information only)

For Facilitator procedures refer to the TAFEnow Facilitator Space at


http://tafenow.com.au/teacher-resources

ICTNWK403_UAG_v1 Created: 19/08/15 Revised: 6/10/15 Page 2 of 6


Unit Assessment Guide
Assessment events
Assessment event 1 – Report – Network security management

This event requires you to submit a report that demonstrates your ability to implement and manage security functions
throughout a network.

This assessment event is based on the information found in this scenario. Your report must include the following
sections:

1. Security policy

2. Enable and verify user logon audit

3. Local groups and permissions

4. Antivirus for home computers

5. Environmental threats

6. Backup policy

7. Resource folder - Auditing the system

These sections must address the criteria as listed in Table 1

Note:

o Ensure that you apply the content of your analysis to the context to the scenario. Your answers should reflect
industry currency and best practice.

o The report is to be a word processed document addressing each of the criteria in Table 1 and formatted with:

o Title page

o Table of contents (for documents over 5 pages)

o Version numbering

o Page numbers (for documents over 5 pages)

These items must address the criteria as listed in Table 1

ICTNWK403_UAG_v1 Created: 19/08/15 Revised: 6/10/15 Page 3 of 6


Unit Assessment Guide
Marking criteria
Table 1

You must meet the below criteria in order to successfully complete this assessment event.

1. Security policy In this section of the report, provide a brief description of:

a. the data security that is in place

b. the type of physical security in place

c. the type of remote access

d. of User login security and the structure of usernames (i.e. how they will be formatted)

2. Enable and verify In this section of the report:


user logon audit
a. Provide a detailed description of the process required to enable and verify auditing of
user logons in the new office.

Tip: Be sure to view the security log to ensure it is working correctly.

3. Local groups and In this section of the report:


permissions
a. Provide a list of steps required to:

i. Create the following local groups on your computer:

o MF_Accounting

o MF_Media_Staff

o MF_Management

ii. Assign permissions so that each folder listed below can only be accessed by
the relevant local group.

 Corporate Data

 Accounting

 Managment

 Media_Staff

4. Antivirus for In this section of the report:


home computers

ICTNWK403_UAG_v1 Created: 19/08/15 Revised: 6/10/15 Page 4 of 6


Unit Assessment Guide
You must meet the below criteria in order to successfully complete this assessment event.

a. Provide a list of the steps required to support staff in installing appropriate antivirus
software on their home computer. Specifically you must:

i. Identify your preferred antivirus package and explain why you have selected
it over the others.

ii. Demonstrate the steps involved to install and configure the antivirus
software for use at home.

b. Provide a screen image showing you have tested the antivirus software using an
EICAR Test File.

5. Environmental In this section of the report:


threats
a. Identify two (2) environmental threats to company data

b. Provide a detailed description of each threat, the damage it could cause and the
likelihood of it occurring

c. Provide a plan to protect the data as best you can from each of these threats

6. Backup policy In this section of the report:

a. Develop a Backup Policy for the company which must include the following
information:

i. Backup schedule and type of backup (e.g. full, incremental, differential).


Explaining why you have chosen this backup strategy.

ii. Backup media type

iii. Storage location and transportation of backup media

iv. Step-by-step instructions with screenshots or a link to a screencast explaining


how staff can back-up and restore data on their home computers

v. Step-by-step instructions with screenshots or a link to a screencast explaining


how staff can use a cloud storage service as a backup solution

Tip: New data is generated each day.

7. Resource folder - Generate a resource folder (zip file) which contains the following information:
Auditing the
system a. Step-by-step instructions with screenshots or a screencast that demonstrates how to
export all information from MSINFO32.EXE. Saving the exported file as
ALL_MSINFO32.TXT.

ICTNWK403_UAG_v1 Created: 19/08/15 Revised: 6/10/15 Page 5 of 6


Unit Assessment Guide
You must meet the below criteria in order to successfully complete this assessment event.

b. A professional spreadsheet which will allow you to record all hardware and software
assets for the company, pre fill it with 10 pieces of hardware and 5 pieces of software.

c. A brief summary of the key features of at least 3 network monitoring tools that could
be used to monitor the system.

d. Step-by-step instructions with screenshots or a screencast demonstrating how to use


Microsoft Performance Monitor to monitor network traffic (bytes sent/received) for a
period of one minute on your local machine. Saving the graph as
NETWORK_ACTIVITY.GIF.

ICTNWK403_UAG_v1 Created: 19/08/15 Revised: 6/10/15 Page 6 of 6

S-ar putea să vă placă și