Unit Of competency
Modification History
Release |
Comments |
Release 1 |
This version first released with ICT Information and Communications Technology Training Package Version 1.0. |
Application
This unit describes the skills and knowledge required to monitor and administer security functions of an information and communications technology (ICT) system.
It applies to experienced individuals who, while working under a level of supervision, have responsibility in a frontline technical support capacity to ensure organisational standards are met, and apply technical and specialised knowledge to maintain the security of a system.
No licensing, legislative, or certification requirements apply to this unit at the time of publication.
Unit Sector
Systems administration and support
Elements and Performance Criteria
ELEMENT |
PERFORMANCE CRITERIA |
Elements describe the essential outcomes. |
Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Ensure user accounts are controlled |
1.1 Modify default user settings to ensure they conform to security policy 1.2 Modify previously created user settings to ensure they conform to updated security policy 1.3 Ensure legal notices displayed at logon are appropriate 1.4 Check strength of passwords using the appropriate utilities and consider tightening rules for password complexity 1.5 Take action to ensure password procedures are reviewed with appropriate other internal departments 1.6 Monitor email to uncover breaches in compliance with legislation 1.7 Access information services to identify security gaps and take appropriate action using hardware and software or patches |
2. Secure file and resource access |
2.1 Review inbuilt security and access features of the operating system and consider need for further action 2.2 Develop or review the file security categorisation scheme, and develop an understanding of the role of users in setting security 2.3 Monitor and record security threats to the system 2.4 Implement a virus checking process and schedule for the server, computer and other system components 2.5 Investigate and implement inbuilt or additional encryption facilities |
3. Monitor threats to the network |
3.1 Use third-party software or utilities to evaluate and report on system security 3.2 Review logs and audit reports to identify security threats 3.3 Carry out spot checks and other security strategies to ensure that procedures are being followed 3.4 Prepare and present an audit report and recommendations to appropriate person 3.5 Obtain approval for recommended changes to be made |
Foundation Skills
This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.
Skill |
Performance Criteria |
Description |
Reading |
1.3, 1.6, 1.7, 2.1, 2.2, 2.5, 3.1, 3.5 |
|
Writing |
1.5, 2.2, 2.3, 3.1, 3.4 |
|
Oral Communication |
1.5, 3.1, 3.5 |
|
Numeracy |
1.1, 1.2, 2.3-2.5, 3.1, 3.2 |
|
Interact with others |
1.5, 3.4, 3.5 |
|
Get the work done |
1.1-1.7, 2.1-2.5, 3.1-3.4 |
|
Unit Mapping Information
Code and title current version |
Code and title previous version |
Comments |
Equivalence status |
ICTSAS418 Monitor and administer security of an ICT system |
ICASAS418A Monitor and administer security of an IT system |
Updated to meet Standards for Training Packages. Minor edit to the competency title. |
Equivalent unit |
Links
Companion Volume implementation guides are found in VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2