^

 
 

Unit of competency details

ICTNWK502 - Implement secure encryption technologies (Release 1)

Summary

Usage recommendation:
Superseded
Mapping:
MappingNotesDate
Supersedes and is equivalent to ICANWK502A - Implement secure encryption technologiesUpdated to meet Standards for Training Packages. 24/Mar/2015
Is superseded by and equivalent to ICTNWK537 - Implement secure encryption technologies 20/Jul/2020

Release Status:
Current
Releases:
ReleaseRelease date
1 1 (this release) 25/Mar/2015


Qualifications that include this unit

CodeSort Table listing Qualifications that include this unit by the Code columnTitleSort Table listing Qualifications that include this unit by the Title columnRelease
ICT50115 - Diploma of Information TechnologyDiploma of Information Technology1-2 
ICT50415 - Diploma of Information Technology NetworkingDiploma of Information Technology Networking1-2 
ICT60215 - Advanced Diploma of Network SecurityAdvanced Diploma of Network Security1-2 
ICT50318 - Diploma of Information Technology Systems AdministrationDiploma of Information Technology Systems Administration
ICT60615 - Advanced Diploma of Telecommunications Network EngineeringAdvanced Diploma of Telecommunications Network Engineering
ICT50118 - Diploma of Information TechnologyDiploma of Information Technology
ICT50315 - Diploma of Information Technology Systems AdministrationDiploma of Information Technology Systems Administration1-2 
ICT60515 - Advanced Diploma of Computer Systems TechnologyAdvanced Diploma of Computer Systems Technology
ICT50418 - Diploma of Information Technology NetworkingDiploma of Information Technology Networking
Items per page 10 | 20 | 50 | 100
Displaying items 1 - 9 of 9

Classifications

SchemeCodeClassification value
ASCED Module/Unit of Competency Field of Education Identifier 029901 Security Science  

Classification history

SchemeCodeClassification valueStart dateEnd date
ASCED Module/Unit of Competency Field of Education Identifier 029901 Security Science  30/Jul/2015 
The content being displayed has been produced by a third party, while all attempts have been made to make this content as accessible as possible it cannot be guaranteed. If you are encountering issues following the content on this page please consider downloading the content in its original form

Unit Of competency

Modification History

Release 

Comments 

Release 1

This version first released with ICT Information and Communications Technology Training Package Version 1.0.

Application

This unit describes the skills and knowledge required to ensure secure file encryption is selected, implemented and monitored on a computer network or local environment.

It applies to individuals working as information and communications technology (ICT) professionals who may select, implement and monitor a secure encryption environment in any size enterprise.

No licensing, legislative or certification requirements apply to this unit at the time of publication.

Unit Sector

Networking

Elements and Performance Criteria

ELEMENT 

PERFORMANCE CRITERIA 

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Determine encryption methods

1.1 Analyse enterprise data security requirements

1.2 Create a new or review an existing security plan to determine appropriate encryption methods

1.3 Review a range of encryption technologies and rank the most appropriate options

1.4 Assess the costs associated with each encryption option

1.5 Document encryption options and costs, and forward to appropriate person for decision

2. Implement encryption

2.1 Apply encryption technologies to the enterprise system

2.2 Analyse effect of encryption technologies on user roles and responsibilities

2.3 Inform user of new encryption technologies and the effect it has on their responsibilities

3. Monitor encryption

3.1 Analyse implementation of the encryption technologies, confirming function and performance

3.2 Review help desk records for problems concerning implementation and take appropriate action

3.3 Review system logs for encryption issues and compromises

3.4 Document encryption issues and compromises, and notify appropriate person

Foundation Skills

This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.

Skill 

Performance Criteria 

Description 

Reading

1.1, 3.2

  • Gathers, interprets and analyses technical data to determine security requirements and help desk records to interpret technical compromises

Writing

1.1, 1.3, 1.5, 3.4

  • Prepares workplace documentation that incorporates an evaluation of technical information and specialised and cohesive language in a format and style appropriate to a specific audience

Oral Communication

2.3, 3.4

  • Articulates requirements and responsibilities clearly and distinctively, using technical language appropriate to audience and environment

Numeracy

1.4

  • Uses mathematical formulas and calculations to undertake a cost-benefit analysis

Navigate the world of work

1.1

  • Recognises and follows explicit and implicit protocols, and meets expectations associated with own role

Interact with others

1.5

  • Selects the appropriate form, channel and mode of communication for a specific purpose relevant to own role

Get the work done

1.3, 2.1, 2.2, 3.1-3.3

  • Uses a combination of formal, logical planning processes and an increasingly intuitive understanding of context to determine data security threats, risks and countermeasures
  • Manages and maintains data securely and actively monitors technology, notifying others if security becomes compromised
  • Understands the purposes, specific functions and key features of common digital systems and tools, and operates them effectively to complete routine tasks
  • Initiates standard procedures when responding to familiar problems to troubleshoot, debug and correct connectivity and security issues

Unit Mapping Information

Code and title 

current version 

Code and title 

previous version 

Comments 

Equivalence status 

ICTNWK502 Implement secure encryption technologies

ICANWK502A Implement secure encryption technologies

Updated to meet Standards for Training Packages

Equivalent unit

Links

Companion Volume implementation guides are found in VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2

 

Assessment requirements

Modification History

Release 

Comments 

Release 1

This version first released with ICT Information and Communications Technology Training Package Version 1.0.

Performance Evidence

Evidence of the ability to:

  • analyse enterprise data security requirements
  • create or review existing security plan to determine the appropriate encryption methods
  • rank and document appropriate encryption methods
  • implement encryption systems and inform users of any impacts
  • monitor and document encryption issues and compromises, and notify appropriate person.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

  • explain certificate related infrastructure (certificate authorities, registration authorities, repository services)
  • summarise common asymmetric key algorithms and their usage
  • explain common symmetric key algorithms and their usage, such as:
  • advanced encryption standard (AES)
  • data encryption standard (DES)
  • triple data encryption algorithm (triple DES)
  • Blowfish
  • explain encryption strength
  • summarise various encryption types, including public key, secret key, hash key
  • summarise the functions and features of:
  • access control permissions
  • digital signatures
  • symmetric encryption, asymmetric encryption and one-way encryption
  • timestamps
  • explain one-way message digests, such as message digest algorithm 5 (MD5) and secure hash algorithm (SHA)
  • explain public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard (GnuPG)
  • outline replay security
  • outline possible sources of security threats, including eavesdropping, data interception, data corruption, data falsification and authentication issues
  • explain transmission control protocol or internet protocol (TCP/IP) protocols and applications
  • summarise security problems and challenges that arise from organisational issues
  • outline wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected access 2 (WPA2).

Assessment Conditions

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the network industry, and include access to:

  • a site where encryption installation may be conducted
  • a live network
  • servers
  • encryption software
  • encryption tools.

Assessors must satisfy NVR/AQTF assessor requirements.

Links

Companion Volume implementation guides are found in VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2