Documente Academic
Documente Profesional
Documente Cultură
Unit details
Unit Code: ICTNWK403
Unit purpose This unit describes the skills and knowledge required to lead the development of asset
protection processes, determining threats and implementing controls to mitigate risk.
Unit outcome This unit is not graded. Your result will be recorded as:
Assessment plan
To demonstrate competence in this unit, you must successfully complete each of the following assessment events:
Submission dates Submission of assessment events are flexible to your own personal needs. You should
discuss a timeline with your facilitator in order to determine suitable dates to submit each
assessment event for marking.
Submission instructions Your assessment events must be submitted online via the TAFEnow website.
o Complete each of your assessment events and save your files with the event name
and your own name – for example: Event1_john_smith.
o Upload your assessment event files and any other additional attachments to the
space provided in the TAFEnow online learning platform.
Facilitator support and There is no facilitator supervision required for these assessment events. If you are unclear
supervision about any aspect of the assessment please contact your facilitator for guidance.
General information For general information relating to assessment procedures at TAFEnow refer to
http://tafenow.com.au/aboutassessment
This event requires you to submit a report that demonstrates your ability to implement and manage security functions
throughout a network.
This assessment event is based on the information found in this scenario. Your report must include the following
sections:
1. Security policy
5. Environmental threats
6. Backup policy
Note:
o Ensure that you apply the content of your analysis to the context to the scenario. Your answers should reflect
industry currency and best practice.
o The report is to be a word processed document addressing each of the criteria in Table 1 and formatted with:
o Title page
o Version numbering
You must meet the below criteria in order to successfully complete this assessment event.
1. Security policy In this section of the report, provide a brief description of:
d. of User login security and the structure of usernames (i.e. how they will be formatted)
o MF_Accounting
o MF_Media_Staff
o MF_Management
ii. Assign permissions so that each folder listed below can only be accessed by
the relevant local group.
Corporate Data
Accounting
Managment
Media_Staff
a. Provide a list of the steps required to support staff in installing appropriate antivirus
software on their home computer. Specifically you must:
i. Identify your preferred antivirus package and explain why you have selected
it over the others.
ii. Demonstrate the steps involved to install and configure the antivirus
software for use at home.
b. Provide a screen image showing you have tested the antivirus software using an
EICAR Test File.
b. Provide a detailed description of each threat, the damage it could cause and the
likelihood of it occurring
c. Provide a plan to protect the data as best you can from each of these threats
a. Develop a Backup Policy for the company which must include the following
information:
7. Resource folder - Generate a resource folder (zip file) which contains the following information:
Auditing the
system a. Step-by-step instructions with screenshots or a screencast that demonstrates how to
export all information from MSINFO32.EXE. Saving the exported file as
ALL_MSINFO32.TXT.
b. A professional spreadsheet which will allow you to record all hardware and software
assets for the company, pre fill it with 10 pieces of hardware and 5 pieces of software.
c. A brief summary of the key features of at least 3 network monitoring tools that could
be used to monitor the system.