U11 Cyber Security and Incident Management Task SAM PDF
U11 Cyber Security and Incident Management Task SAM PDF
U11 Cyber Security and Incident Management Task SAM PDF
Sample
Assessment
Materials (SAMs)
For use with Diploma and Extended Diploma in
Information Technology
About Pearson
Pearson is the world's leading learning company, with 35,000 employees in more than 70 countries
working to help people of all ages to make measurable progress in their lives through learning.
We put the learner at the centre of everything we do, because wherever learning flourishes, so do
people. Find out more about how we can help you and your learners at qualifications.pearson.com
References to third-party material made in this specification are made in good faith, we
do not endorse, approve or accept responsibility for the content of materials, which may
be subject to change, or any opinions expressed therein. (Material may include
textbooks, journals, magazines and other publications and websites.)
If you need further information on these changes or what they mean, contact us via our
website at: qualifications.pearson.com/en/support/contact-us.html.
Pearson BTEC Level 3 Nationals
Instructions
Paper reference
XXXX/XX
*S59204A*
S59204A
©2017 Pearson Education Ltd.
1/1/1
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials 1
Issue 3 – April 2019 © Pearson Education Limited 2019 Turn over
Instructions to Invigilators
Part A set task is undertaken under supervision in a single session of 5 hours
in the timetabled days. Centres may schedule a supervised rest break during
the session. In order to enable learners to have access to computers a period
of 3 days is provided for centres to timetable assessment. Centres should
schedule all learners in the same sessions if possible and must release
Part A to individual learners only for their scheduled sessions.
Internet access is not permitted.
During any break, materials must be kept securely.
All learner work must be completed independently and authenticated by
the Invigilator before being submitted to Pearson.
Learners must complete this task on a computer using the templates
provided and appropriate software. All work must be saved as a PDF
document for submission. Learners must save their work regularly and
ensure that all materials can be identified as their work.
The supervised assessment will take place in a timetabled slots. Centres
should schedule all learners at the same time or supervise cohorts to ensure
there is no opportunity for collusion.
The set task is a formal external assessment and must be conducted with
reference to the instructions in this task booklet and the BTEC Nationals
Instructions for Conducting External Assessments (ICEA) document to ensure
that the supervised period is conducted correctly and that learners have the
opportunity to carry out the required activities independently.
Learners must not bring anything into the supervised environment or take
anything out without your approval.
Centres are responsible for putting in place appropriate checks to ensure
that only permitted material is introduced into the supervised environment.
Maintaining security:
During supervised assessment sessions, the assessment areas must only
be accessible to the individual learner and to named members of staff.
Learners can only access their work under supervision.
Any work learners produce under supervision must be kept secure.
Only permitted materials for the set task can be brought into the
supervised environment
During any permitted break and at the end of the session materials must
be kept securely and no items removed from the supervised environment
2 2 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Learners are not permitted to have access to the internet or other
resources during the supervised assessment period.
Learner work is regularly backed up.
Learners will save their work to their folder using the naming instructions
indicated in each activity.
Any materials being used by learners must be collected in at the end of
the 5 hours, stored securely and handed back at the beginning of the
Part B session.
After the session the invigilator will confirm that all learner work had been
completed independently as part of the authentication submitted to
Pearson.
Outcomes for submission
Each learner must submit the following:
Activity 1 – Risk assessment of the networked system – PDF document
Activity 2 – Cyber security plan for the networked system – PDF document
Activity 3 – Management report – solution justification – PDF document.
Each learner must complete an authentication sheet.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 3 3
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Instructions for Learners
Read the set task information carefully. You should only consider threats,
vulnerabilities, risks and protection measures that are implied and/or
specified in the scenario.
In Part B you will be given a case study. Use this Part A booklet to prepare
by relating your learning to the specific information given.
Internet access is not permitted.
You will complete Part B under supervised conditions.
You must work independently and should not share your work with other
learners.
Your teacher may give guidance on when you can complete the preparation.
Your teacher can not give you feedback during the preparation period.
Materials from Part A of the set task must not be taken into or accessed
during Part B.
Outcomes for submission
You should submit :
Activity 1 – Risk assessment of the networked system – PDF document
Activity 2 – Cyber security plan for the networked system – PDF document
Activity 3 – Management report – solution justification – PDF document.
You must complete a declaration that the work you submit is your own.
4 4 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Set Task Information
You are asked to use your cybersecurity and network systems understanding
and skills in a given scenario.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 5 5
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Paintballing site 4 has two levels. The layout is shown in these diagrams.
Main entrance
to bunker
Reception
5 metres
lower level
Fire door
Stairs to
Door
Paintball target range
Store
Window
Upper level
Fire door
lower level
Stairs to
Workshop
Admin Office
IT Centre
6 6 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Stairs to upper level
Lower level
5 metres
Stairs to upper level
Window
Door
Enemy base
Workshop
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 7 7
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
The upper level is built above ground. The IT centre already has an external
telephone/internet connection.
The lower level is 10 metres underground and the layout cannot be
changed. Emma has had false ceilings installed throughout the lower level
to give it a more closed-in feel. The space has been used for any networking
cabling and other infrastructure.
Emma employs IT staff at each site but would like some fresh ideas for
securing the network at paintballing site 4.
8 8 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Client brief
You have been hired to advise Emma on all IT security matters for
the project.
Emma is flexible about how the security measures are implemented at
paintballing site 4, provided that the networked system is fully secured.
During a meeting with Emma, she gives you the following information
about paintballing site 4.
1. The system complies with the outline specification.
2. The network in the upper level is mainly connected by Wi-Fi.
3. The network in the lower level is mainly connected by cables.
4. The admin office and reception each have a personal computer (PC) and
networked printer.
5. The admin server stores client details, including payment information,
which must be kept secure.
6. All of the upper level has network and internet access for mobile devices,
including both staff and players.
7. Defence devices such as paint guns may be placed in any part of
the lower level and the devices must be kept secure. They must
be networked and will often be relocated and adjusted between
paintballing sessions. Provision must be made to locate several devices in
any room or corridor.
8. Each of the defence devices has a control box and Ethernet (RJ45) port
that may be adjusted via internal web pages hosted on that control box.
The web pages must be accessible from the IT centre and the
enemy base.
The web pages must be accessible from the IT centre and the enemy base.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 9 9
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Logical networked system
Controlled
Paint Gun
Proximity Sensor
Power Supply
Alarm
Camera
Detector
Laptop 2
Laptop 1
Upper Level
WiFi
Paintballing
Site 4
Administration
Server
Internet
10 10 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
The following technical information must be considered in relation to the
logical networked system diagram.
1. The admin server is within the admin domain, however it will be on its
own network segment.
2. The laptops are also within the admin domain, these are in their own
network segment.
3. All devices on the lower level switch are ‘representative’ of the type of
automated technologies that will be used. These are all within their
own paintballing domain and separate network segment. They will
communicate only with the administration server.
4. The paintballing site 4 router will run all firewall and relevant
cybersecurity technology to protect the network, both internally and
externally.
The router for paintballing site 4 will offer network address translation (NAT)
for the network, to the rest of the internet. Your ISP has issued a single IP
address for the entire system.
The system should be set up as follows.
1. The Wi-Fi has two service set identifiers (SSID), each running its own Wi-Fi
Protected Access 2 (WPA2) with a separate key:
a. one SSID is for visiting customers
b. the other SSID is for staff laptops.
2. Between the admin server and the laptops, ports 80 (Hypertext Transfer
Protocol (HTTP)), 443 (HTTP Secure) and 993 (Internet Message Access
Protocol) must be open and visible to the staff laptops.
3. The admin server must not be visible to any other device on the Wi-Fi
network. The admin server acts as a controller for the automated devices,
and these will only use port 12345.
4. There must be no opportunity for anyone on the Wi-Fi network to
connect to the automated devices. This is for safety reasons and to
prevent cheating in the paintball matches. The staff administer the
automated devices via secure web pages. These web pages are reachable
from a PC in the enemy base and from the admin server in the IT centre.
The staff use the admin server to administer client details and use local
email.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 11 11
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
5. The network uses private, Class C, IPv4 addresses.
All devices on the Wi-Fi network can access the internet. This will be set for
typical web browsing and email. Ports that are not required for data traffic
must be blocked. There must be no opportunity for anyone on the internet
to gain unauthorised access to any of the networks in paintballing site 4.
There are no fixed rules regarding setting up security and network
addressing, in responding to this scenario you must present reasonable
justification regarding the decisions you have made.
12 12 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Part A of Set Task
You must complete ALL activities in the set task.
Read the scenario carefully before you begin and note that reading
time is included in the overall assessment time.
You should only consider threats, vulnerabilities, risks and protection
measures that are implied and/or specified in the scenario.
All documents MUST have a header and a footer. The header must contain
the activity number. The footer must contain your name, candidate number
and centre number.
A minimum font size of 10 should be used in all word processed documents,
using a font type suitable for business purposes.
Any diagrams should be large enough for the detail to be read.
Design cybersecurity protection measures for the given
computer network.
Emma employs IT staff at each site but would like some fresh ideas for
paintballing site 4. You have been hired to advise Emma on cybersecurity
and incident management.
Activity 1 – Risk assessment of the networked system
You are advised to spend 1.5 hours on this task.
Using the template given, produce a cybersecurity risk assessment of the
given networked system.
Template file name is CS Part A – A1 – Template Risk Assessment.doc.
Save your completed risk assessment in your submission folder as
activity1riskassessment.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 13 13
Issue 3 – April 2019 © Pearson Education Limited 2019
Activity 2 – Cybersecurity plan for the networked system
You are advised to spend 2.5 hours on this task.
Using the template given, prepare a cybersecurity plan for the computer
network using the results of the risk assessment. For each protection
measure you must consider:
a) threat(s) addressed by the protection measure
b) action(s) to be taken
c) reasons for the action(s)
d) overview of constraints – technical and financial
e) overview of legal responsibilities
f ) overview of usability of the system
g) outline cost-benefit
h) test plan.
Duplicate (copy and paste) and complete the cybersecurity plan using the
template given for each protection measure, as appropriate.
Template file name is CS Part A – A2 – Template Security Plan.doc.
Save your completed security plan in your submission folder as
activity2securityplan.
14 14 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Activity 3 – Management report justifying the solution
You are advised to spend 1 hour on this task.
Produce a management report, justifying how the proposed cybersecurity
plan will meet the security requirements of the scenario. It should include:
an assessment of the appropriateness of your protection measures
a consideration of alternative protection measures that could be used
a rationale for choosing your protection measures over the alternatives.
Save your completed security plan in your submission folder as
activity3managementreport.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 15 15
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Set Task Electronic Templates
Activity 1 Template: Risk assessment of the networked system
Probability Potential
Explanation of the Risk
Number Threat title of size of loss/
threat in context severity
occurrence impact level
16 16 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A
Issue 3 – April 2019 © Pearson Education Limited 2019
Activity 2 Template: Cybersecurity plan for the networked system
Use the section headings below for each protection measure.
1) Threat(s) addressed by the protection measure
2) Details of action(s) to be taken
3) Reasons for the actions
4) Overview of constraints – technical and financial
5) Overview of legal responsibilities
6) Overview of usability of the system
7) Outline cost-benefit
Test plan
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59204A 17 17
Issue 3 – April 2019 © Pearson Education Limited 2019
18 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
Issue 3 – April 2019 © Pearson Education Limited 2019
Pearson BTEC Level 3 Nationals
Write your name here Level
3
Surname Forename
B
Set task: Unit 11 Cyber Security and Incident
Marks
Management
Supervised
Diploma and Extended Diploma in Information Technology hours
Sample assessment material for first teaching XX
September 2017
Instructions
Part A will need to have been used in preparation for completion of Part B.
Part B booklet must be issued to learners as defined by Pearson and should be
kept securely.
Part B booklet must be issued to learners on the specified date.
Part B is specific to each series and this material must only be issued to learners
who have been entered to undertake the task in that series.
Part B should be kept securely until the start of the supervised assessment
periods.
Information
Paper reference
20161K
*S59223A*
S59223A
©2017 Pearson Education Ltd.
1/1/1/1/1
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials 19
Issue 3 – April 2019 © Pearson Education Limited 2019 Turn over
Instructions to Invigilators
Part A and Part B set tasks must be completed during the period of three
weeks timetabled by Pearson. Part A must be completed before starting
Part B.
The five-hour, Part A set task must be carried out under supervised
conditions. The set task can be in more than one supervised session.
Learners must complete this task on a computer using the templates
provided and appropriate software. All work must be saved as a PDF
document for submission. Learners must save their work regularly and
ensure that all materials can be identified as their work.
Centres should schedule all learners in the same sessions if possible and
must release Part B to individual learners only for their scheduled sessions
Internet access is not permitted.
The set task is a formal external assessment and must be conducted with
reference to the instructions in this task booklet and the BTEC Nationals
Instructions for Conducting External Assessments (ICEA) document to ensure
that the supervised assessment is conducted correctly and that learners
submit evidence that is their own work.
Learners must not bring anything into the supervised environment or take
anything out without your approval.
Centres are responsible for putting in place appropriate checks to ensure
that only permitted material is introduced into the supervised environment.
Maintaining security:
ÂÂ During supervised assessment sessions, the assessment areas must only
2 20 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
After the session the invigilator will confirm that all learner work had been
completed independently as part of the authentication submitted to
Pearson.
Outcomes for submission
Each learner must submit the following:
ÂÂ Activity 4 – Forensic incident analysis – PDF document
ÂÂ Activity 5 – Management report – improvements – PDF document.
Each learner must complete an authentication sheet.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 21 3
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Instructions for Learners
Read the set task information carefully. You should only consider threats,
vulnerabilities, risks and protection measures that are implied and/or
specified in the scenario.
You have a number of sessions to complete the set task provided by your
centre. Plan your time carefully and allow time to produce your outcomes
for submission.
Internet access is not permitted.
You will complete this set task under supervision and your work will be kept
securely during any breaks taken.
You must work independently throughout the supervised assessment
period and must not share your work with other learners.
Outcomes for submission
You should submit:
ÂÂ Activity 4 – Forensic incident analysis – PDF document
ÂÂ Activity 5 – Management report – improvements – PDF document.
You must complete a declaration that the work you submit is your own.
4 22 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
Set task Information
You are asked to use your cyber security and incident management
understanding and skills in a given scenario.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 23 5
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Client brief
You have been working with Emma to secure the networked system
on paintballing site 4 and now Emma wants you to investigate a
cybersecurity incident at site 2.
Following a visit to paintballing site 2 on 21st May 2016, Emma’s
antimalware software alerted her to a suspicious file running on her laptop.
Emma asked the IT technician at site 2 to examine the file. The technician
identified it as being a keylogging program, klogX.exe, and deleted the file
from the laptop. An internal investigation into how the infection might have
happened was inconclusive. Emma has asked you to review the incident and
the investigation that followed.
6 24 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
Evidence items from the security incident at paintballing site 2
Evidence items include:
1 anti-malware alert
2 key logger properties
3 incident timeline
4 log of IT processes
5 network diagram
6 cybersecurity document – incident management policy.
Evidence items 1 to 5 are required for Activity 4.
Evidence items 1 to 6 are required for Activity 5.
Warning ? X
Available actions
Figure 1
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 25 7
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
2 Figure 2 shows a snapshot of the klogX.exe info
klogX.exe Properties x
General Compatability Digital Signatures Security Details
klogX.exe
OK Cancel Apply
Figure 2
8 26 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
3 Incident timeline
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 27 9
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
4 Log of IT processes
10 28 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
5 Figure 3 shows site 2 with its network.
The network follows the common specification for all of the sites. The admin
office and IT centre are in a separate building to the reception and team
assembly area and the customers (“paintballers”) do not have access.
The enemy base is kept locked unless occupied by a member of staff.
Figure 3 – network diagram for site 2
Figure 3
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 29 11
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
The following evidence item is only required for Activity 5.
12 30 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
b) Theft of company data
ÂÂ Theft or loss of company data may occur in a number of different ways.
ÂÂ Any loss of company data must be reported at once to the CSIRT team
leader, initially a verbal report must be made followed up by email.
ÂÂ The CSIRT must investigate the loss and identify exactly what data has
been lost or stolen and when the incident occurred.
ÂÂ Having identified what has been lost or stolen and when, the CSIRT must
retrieve backups and restore the data as soon as possible.
ÂÂ The CSIRT should review the incident and implement procedures to
prevent future losses.
c) Infection of company IT systems with malware
ÂÂ Any member of staff who suspects that any IT system has been infected
with malware must report it at once to the CSIRT team leader, initially a
verbal report must be made followed up by email.
ÂÂ The infected system should be shut down as soon as possible
ÂÂ The CSIRT will investigate the infection and take appropriate measures to
resolve the infection and restore the system.
d) Unauthorised access to company systems
ÂÂ Any member of staff who suspects that there has been unauthorised
access to any company IT system must report it at once to the CSIRT team
leader, providing as much detail as possible (which system, how access
was obtained). Initially, a verbal report must be made followed up by
email.
ÂÂ The CSIRT will thoroughly investigate the incident and identify how the
unauthorised access was obtained.
The CSIRT will take whatever action is required to prevent future
occurrences (e.g. change passwords).
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 31 13
Issue 3 – April 2019 © Pearson Education Limited 2019
Turn over
Set Task
You must complete ALL activities in the set task.
Read the scenario carefully before you begin and note that reading
time is included in the overall assessment time.
All documents MUST have a header and a footer. The header must contain
the activity number. The footer must contain your name, candidate number
and centre number.
A minimum font size of 10 should be used in all word-processed documents,
using a font type suitable for business purposes.
Any diagrams should be large enough for the detail to be read.
You have been working with Emma to secure the networked system on
paintballing site 4 and now Emma wants you to investigate a cyber security
incident at paintballing site 2.
Activity 4 – Forensic incident analysis
You are advised to spend 2 hours on this task.
Analyse the forensic evidence, including how the evidence was obtained, for
the cybersecurity incident at paintballing site 2.
Consider possible causes of the incident and come to a conclusion about
the most likely cause of the incident.
Refer to evidence items 1–5 inclusive.
Template file name is CS Part B – B4 - Template Forensic Analysis.doc.
Save your completed forensic incident analysis in your submission folder as
activity4incidentanalysis.
14 32 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A
Issue 3 – April 2019 © Pearson Education Limited 2019
Read the scenario and evidence items 1–6 inclusive when answering the
question.
Save your completed management report in your submission folder as
activity5managementreport.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
S59223A 33 15
Issue 3 – April 2019 © Pearson Education Limited 2019
34 Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
Issue 3 – April 2019 © Pearson Education Limited 2019
Unit 11: Cyber Security and Incident
Management – Sample marking grid
The marking grids have been designed to assess learner work holistically. Rows within
the grids identify the assessment focus/outcome being targeted. When using a
marking grid, the ‘best fit’ approach should be used.
Examiners should first make a holistic judgement on which band most closely
matches the learner response and place it within that band. Learners will be
placed in the band that best describes their answer.
The mark awarded within the band will be decided based on the quality of the
answer in response to the assessment focus/outcome and will be modified
according to how securely all bullet points are displayed at that band.
Marks will be awarded towards the top or bottom of that band depending on how
they have evidenced each of the descriptor bullet points.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials 35
Issue 3 – April 2019 © Pearson Education Limited 2019
Part A, Activity 1 – Risk assessment of the networked system
36
Assessment Band 0 Band 1 Band 2 Band 3 Max
focus mark
Activity 1: 0 1-3 4-6 7-8 8
Risk
Demonstrates superficial Demonstrates sound Demonstrates in-depth
assessment of
understanding of security understanding of security understanding of security
the
threats. threats. threats.
networked
system
Risk assessment shows Risk assessment shows Risk assessment shows
limited interpretation of reasoned interpretation of perceptive interpretation
the scenario, using the scenario, using some of the scenario, using
generic reasoning to logical chains of reasoning logical chains of reasoning
identify some obvious to identify an adequate to identify a
and/or common threats. range of threats. comprehensive range of
threats.
No awardable content
judgements of: of:
risk severity
risk severity risk severity
risk probability
risk probability risk probability
size of potential loss.
size of potential loss. size of potential loss.
Report includes reasons Report includes reasons Report includes reasons Report includes reasons
for actions that for actions that for actions that for actions that
demonstrate a limited demonstrate a basic demonstrate a sound and demonstrate
understanding of the understanding of the logical understanding of comprehensive and in-
function of each protection function of each the function of each depth understanding of
measure in relation to the protection measure in protection measure in the function of each
threat(s). relation to the threat(s). relation to the threat(s). protection measure in
relation to the threat(s).
No awardable content
constraints constraints constraints constraints
Test plan is limited and Test plan is basic and Test plan is adequate and Test plan is
includes few relevant tests includes some relevant includes mostly relevant comprehensive and
and/or actions. tests and/or actions. tests and actions. includes relevant tests
and actions throughout.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
37
Part A, Activity 3 – Management report justifying the solution
38
Assessment Band 0 Band 1 Band 2 Band 3 Band 4 Max
focus mark
Activity 3: 0 1-3 4-6 7-9 10-12 12
Management
Alternative security Appropriate alternative Appropriate alternative Appropriate alternative
report
protection measures, security protection security protection security protection
justifying the
if identified, are likely measures are identified for measures are identified measures are identified
solution
to be inappropriate. some aspects of the for a range of aspects of for a range of aspects of
security plan. the security plan. the security plan.
No awardable content
Limited justification Basic justification that Sound and mostly logical Comprehensive and
that refers to the risk refers to the risk justification that logical justification that
assessment and assessment and security integrates aspects of the integrates aspects of the
security plan to plan to address some of risk assessment and risk assessment and
address a few of the the security requirements. security plan to address security plan to fully
security requirements. most of the security address the security
requirements. requirements.
content
No awardable
40
Assessment Band 0 Band 1 Band 2 Band 3 Band 4 Max
focus mark
Activity 4: 0 1-3 4-7 8-11 12-14 14
Analyse the
Response demonstrates a Response demonstrates a Response demonstrates a Response demonstrates a
forensic
limited understanding of basic understanding of sound understanding of comprehensive
evidence,
the forensic procedures forensic procedures and forensic procedures and understanding of forensic
including how
and how a few pieces of how some of the evidence how most of the evidence procedures and how the
the evidence
evidence were obtained. was obtained. was obtained. evidence was obtained
was obtained,
throughout.
for the cyber
security
Superficial analysis of Reasoned analysis of the Sound analysis of the Perceptive analysis of the
incident and
come to a evidence, with incomplete evidence, showing evidence, showing logical evidence, showing logical
conclusion links between the pieces of generally logical chains of chains of reasoning that chains of reasoning that
about the evidence and/or back to reasoning that link some link most of the evidence comprehensively link the
the scenario. of the evidence together together and back to the evidence together and
probable
and back to the scenario. scenario. back to the scenario.
cause(s) of
No awardable content
the security
incident. Conclusion, if present, Conclusion is plausible and Conclusion is sound and Conclusion is convincing
lacks support or partially supported, with mostly supported, with a and fully supported, with a
plausibility, with little or no an unbalanced generally balanced balanced consideration of
consideration of alternative consideration of consideration of alternative possibilities.
possibilities. alternative possibilities. alternative possibilities.
No awardable content
the likelihood of a of a similar incident. similar incident. similar incident.
similar incident.
Justification is limited Justification is mostly valid Justification is valid and Justification is valid and
and lacks support, and partially supported mostly supported with fully supported with logical
showing a superficial with some logical chains of logical chains of reasoning, chains of reasoning,
understanding of the reasoning, showing a basic showing a sound showing an in-depth
incident. understanding of the understanding of the understanding of the
incident. incident. incident.
Pearson BTEC Level 3 Nationals in Information Technology – Unit 11 – Final Sample Assessment Materials
41
Part B, Activity 4-5 – Use of technical language during the task
42
Assessment Band 0 Band 1 Band 2 Band 3 Max
focus mark
Activity 4–5: 0 1 2 3 3
Use of
Limited appropriate use of Mostly appropriate technical Appropriate and consistent technical
technical
technical language. language with some inconsistencies. language used throughout.
language
content
No awardable