Student Declaration: I Declare That The Work Submitted Is My

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Assessment Details

Qualification Code/Title

Assessment Type Assessment 2 Time allowed

Due Date Location Term / Year

Unit of Competency
National Code/Title ICTNWK546 Manage network security

Student Details
Student Name Student ID

Student Declaration: I declare that the work submitted is my Signature: ____________________________


own and has not been copied or plagiarised from any person or Date: _____/_/_________
source.

Assessor Details
Assessor’s Name
RESULTS (Please
☐SATISFACTORY ☐NOT SATISFACTORY
Circle)
Feedback to student:

*If Student is Not Satisfactory Assessor Declaration: I declare that I have conducted
Reassessment Required ☐ Yes ☐ No a fair, valid, reliable and flexible assessment with this
Comment: student, and I have provided appropriate feedback.

Signature: ________________________
Date: ______/_______/___________
Instructions to the Candidates
 This assessment is to be completed according to the instructions given below in this document.
 Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be
entitled to one (1) resubmit in showing your competence with this unit.
 If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
 Please refer to the College re-submission and re-sit policy for more information.
 If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor
immediately.
 Please read the Tasks carefully then complete all Tasks.
 To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a
satisfactory result for another Assessment.
 This is an Open book assessment which you will do in your own time but complete in the time designated by your assessor.
Remember, that it must be your own work and if you use other sources then you must reference these appropriately
 Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be 12, line spacing
has to be Single line and Footer of submitted document must include Student ID, Student Name and Page Number.
Document must be printed double sided.
 This is Individual Assessments. Once you have completed the assessment, please provide the Hard copy of the
Assessments to your Trainer/ Assessor.
 Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a mark of Not
Satisfactory. SCCM uses Safe Assign Plagiarism Checker to check the originality of the student assessment. Student must
be aware of and understand the SCCM’s policy on plagiarism and certify that this assignment is their own work, except
where indicated by referencing, and that student have followed the good academic practices noted above.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Assessment Page 1 of 9
Oct 2022 Oct 2023 2
Introduction
The assessment tasks for ICTNWK546 Manage network securityare outlined in the assessment
plan below. These tasks have been designed to help you demonstrate the skills and knowledge
that you have learnt during your course.
Please ensure that you read the instructions provided with these tasks carefully. You should also
follow the advice provided in the IT Works Student User Guide. The Student User Guide provides
important information for you relating to completing assessment successfully.

Assessment for this unit


ICTNWK546 Manage network securitydescribes the skills and knowledge required to implement
and manage security functions throughout a network.
For you to be assessed as competent, you must successfully complete two assessment tasks:

 Assessment Task 1: Knowledge questions – You must answer all questions correctly.

 Assessment Task 2: Project – You must work through a range of activities and complete a
project portfolio.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 2 of 9
Oct 2022 Oct 2023 2
Assessment Task 2: Project Portfolio

Information for students


In this task, you are required to demonstrate your skills and knowledge by working through a
number of activities and completing and submitting a project portfolio.
You will need access to:

 a suitable place to complete activities that replicates an ICT environment including access to
network infrastructure where network security will be implemented

 network support tools i.e. information about network security tools that can be used as part of
the design

 security policies and standards e.g. as discussed at: https://business.gov.au/online/cyber-


security/how-to-create-a-cyber-security-policy

 manufacturer’s recommendations for network security equipment (depending on the security


equipment chosen for the design)

 your learning resources and other information for reference

 Project Portfolio template

 Simulation Pack (if you need a case study).

Ensure that you:

 review the advice to students regarding responding to written tasks in the IT Works Student
User Guide

 comply with the due date for assessment which your assessor will provide

 adhere with your RTO’s submission guidelines

 answer all questions completely and correctly

 submit work which is original and, where necessary, properly referenced

 submit a completed cover sheet with your work

 avoid sharing your answers with other students.

i Assessment information

Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide.Refer to the appendix for information on:

 where this task should be completed

 how your assessment should be submitted.

Note: You must complete and submit an assessment cover sheet with your work. A
template is provided in Appendix B of the Student User Guide. However, if your RTO
has provided you with an assessment cover sheet, please ensure that you use that.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 3 of 9
Oct 2022 Oct 2023 2
Activities
Complete the following activities:

1. Carefully read the following:

This project requires you to manage network security for an organisation.You can
complete this project based on the case study organisation in the ICTNWK546
Simulation Pack or you can base it on an organisation that you are familiar with or
working for. If you choose to complete the project based on a business of your
choice, it is important that you can access the network infrastructure where network
security will be implemented, as well as network support tools used to manage
network security and security policies, standards and manufacturer’s
recommendations for network security equipment (see the list of information you
must be able to access). Speak to your assessor to get approval if you want to
base this on an organisation of your choice.

You will be collecting evidence for this unit in a Project Portfolio. The steps you
need to take are outlined below.

2. Preparation

Make sure you are familiar with the organisation you are basing this assessment on
and have read through the necessary background information. For the case study
organisations, this is all of the documents included in the ICTNWK546 Simulation
Pack. If it’s your own organisation, it’s important that you have this approved by
your assessor.
Complete Page 4 of your Project Portfolio for this unit.
Read through the requirements of Section 1 and 2 of your Project Portfolio which
include detailed guidance relevant to all the assessment activities.

3. Preparing for the security design

You are required to prepare for the network security design process, as well as
identify and analyse threats and risks. This involves:

 Defining processes that needs to be followed in order to plan, build and


manage network security.

 Researching and reporting on major threats to any network security, as well as


their origins.

 Researching and reporting on network vulnerabilities.

 Determining current risks to the network and developing a risk management


plan.

 Listing the assets that need to be protected, as well as categorising them

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 4 of 9
Oct 2022 Oct 2023 2
according to their value.
Complete Section 1 of your Portfolio.

4. Create a security design and security policies

You are to create a security design to protect the network for your chosen
organisation. You are also to develop and document relevant security policies
which is also to include the auditing of the network, as well as how to respond to
incidents. Detailed instructions are included in your Portfolio.
You are also to prepare a short presentation about the work that you have
completed that can be presented to a team for feedback. If you are completing this
in your RTO, this will be to a small group of students organised by your assessor. If
you are completing this based on your own business, it can be a presentation to
your team at work or you can also present it to a small group of students.
Your presentation should be for approximately 10 minutes.
Complete Section 2 of your Portfolio.

5. Security design presentation

Provide your presentation to your team about the security design you have
developed. Make sure you provide your team the opportunity to provide feedback.
Following the presentation, you will document the feedback in your Portfolio, as
well as your response.
During the presentation, you are to use oral communication skills including:

 speaking clearly and concisely

 asking questions to identify required information

 responding to questions as required

 using active listening techniques to confirm understanding

 observational techniques to ensure that everyone is participating so that you


can gain a range of different perspectives.

i This can either be viewed in person by your assessor or you may like to video
record the session for your assessor to watch later. Your assessor can provide you
with more details at this step. Make sure you follow the instructions above and
meet the timeframes allocated.
Following the presentation, include the feedback you received in Section 1 of your
Portfolio and make amendments to your quality management plan to include the
corrective action. Further report on the skills of staff, confirming their ability to meet
quality standards or otherwise.

6. Submit your completed Project Portfolio

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 5 of 9
Oct 2022 Oct 2023 2
Make sure you have completed all sections of your Project Portfolio, answered all
questions, provided enough detail as indicated and proofread for spelling and
grammar as necessary.
Submit to your assessor for marking.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 6 of 9
Oct 2022 Oct 2023 2
Assessment Task 2: Checklist

Student’s name:

Completed
successfully? Comments

Did the student: Yes No

Evaluate security information to plan


network security?

Define and document the planning


phase for network security design as per
the organisation’s requirements?

Define and document the building phase


for network security design as per the
organisation’s requirements?

Define and document the managing


phase for network security design as per
the organisation’s requirements?

Identify and report on the organisation’s


assets that required network security
protection?

Categorise and document assets and


determine their value following
organisational requirements?

Determine and report on major threat


themes to network security?

Determine and report on attacker


scenarios and threats according to
network security design specifications?

Determine and report on possible origins


of major threats according to network
security design specifications?

Identify and describe industry standard


common network vulnerability types?

Design and document threat model

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 7 of 9
Oct 2022 Oct 2023 2
according to network security design
specifications?

Review risk management requirements


and develop and document a risk
management plan?

Create and document a network security


design?

Develop and document security policies


including auditing and incidents
response procedure?

Submit document and seek feedback?

Respond to feedback provided?

Use oral communication skills including:

 speaking clearly and concisely

 asking questions to identify required


information

 responding to questions as required

 using active listening techniques to


confirm understanding

 observational techniques to ensure


that everyone is participating so that
you a range of different
perspectives can be gained?

Task outcome:  Satisfactory  Not satisfactory

Assessor signature:

Assessor name:

Date:

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 8 of 9
Oct 2022 Oct 2023 2
Student Overall Assessment Record Sheet
This form is to be completed by the assessor and used a final record of student competency.

All student submissions including any associated checklists (outlined below) are to be attached to this cover sheet before
placing on the students file.

Student results are not to be entered onto the Student Database unless all relevant paperwork is completed and attached to
this form.

Qualification Code and Title

Student Name:

Student ID No:

Final Completion Date:

Unit Code and Title


ICTNWK546 Manage network security

Term Year Date Assessed

Please attach the following documentation to this form Result

Assessment 1 ☐Written Questions ☐S ☐NYS ☐DNS

Assessment 2 ☐Project Portfolio ☐S ☐NYS ☐DNS

Final Assessment Result for this unit ☐C ☐ NYC

C=Competent NYC= Not Yet Competent S= Satisfactory NYS= Not Yet Satisfactory DNS= Did Not Submit

Feedback:

Any Adjustment Made to The Assessment:

Student Declaration: I declare that this work has been completed by me


honestly and with integrity and that I have been assessed in a fair and Assessor Declaration: I declare that I have conducted a fair,
flexible manner. I understand that the Institute’s Student Assessment, valid, reliable and flexible assessment with this student, and I
Reassessment and Repeating Units of Competency Guidelines apply to have provided appropriate feedback.
these assessment tasks.
Name: _________________________________
Name: ____________________________________________
Signature: ______________________________
Signature: _________________________________________
Date: ____/_____/_____
Date: ____/_____/_____
Administrative use only

________________
Entered onto Student Management Database
Date Initials

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Revision date Version
File Name: ICTNWK546 Student Guide Page 9 of 9
Oct 2022 Oct 2023 2

You might also like