Unit of competency
Modification History
Release |
Comments |
Release 1 |
This version first released with ICT Information and Communications Technology Training Package Version 6.0. |
Application
This unit describes the skills and knowledge required to monitor security functions of an Information and Communications Technology (ICT) system and administer security measures.
It applies to experienced individuals who, while working under a level of supervision, have responsibility in a frontline technical support capacity to ensure organisational standards are met and apply technical and specialised knowledge to maintain the security of an ICT system.
No licensing, legislative, or certification requirements apply to this unit at the time of publication.
Unit Sector
Systems administration and support
Elements and Performance Criteria
ELEMENT |
PERFORMANCE CRITERIA |
Elements describe the essential outcomes. |
Performance criteria describe the performance needed to demonstrate achievement of the element. |
1. Access and control user accounts |
1.1 Access ICT system according to organisational procedures 1.2 Modify default and previously created user settings according to security policies 1.3 Access and review logs and audit reports and identify security threats 1.4 Check the requirements for displayed legal notices at log on are aligned to organisational requirements 1.5 Check strength of passwords using required utilities 1.6 Review organisational guidelines for password complexity and tighten if required 1.7 Review password guidelines within other internal departments 1.8 Check for and control legislation compliance breaches 1.9 Identify and resolve ICT system security |
2. Secure file and resource access |
2.1 Review inbuilt security features of file and resource access 2.2 Review and develop file security categorisation scheme 2.3 Monitor and record security threats to ICT system 2.4 Implement file and resource virus checking process 2.5 Schedule ICT system components virus checking process 2.6 Investigate and implement inbuilt and additional encryption facilities |
3. Recommend and administer security measures |
3.1 Perform user spot checks according to organisational policies and procedures 3.2 Document areas and instances where security procedures are not being followed 3.3 Create security adherence recommendations 3.4 Prepare and present audit report and recommendations to required personnel 3.5 Obtain recommended changes approval 3.6 Implement approved changes |
4. Finalise ICT system security procedures |
4.1 Conform all ICT system security checks have been performed 4.2 Review implemented security changes 4.3 Evaluate and report on system security procedures |
Foundation Skills
This section describes language, literacy, numeracy and employment skills incorporated in the performance criteria that are required for competent performance.
S KILL |
DESCRIPTION |
Reading |
|
Writing |
|
Oral Communication |
|
Numeracy |
|
Teamwork |
|
Problem solving |
|
Self-management |
|
Technology |
|
Unit Mapping Information
Supersedes and is equivalent to ICTSAS418 Monitor and administer security of an ICT system.
Links
Companion Volume Implementation Guide is found on VETNet - https://vetnet.gov.au/Pages/TrainingDocs.aspx?q=a53af4e4-b400-484e-b778-71c9e9d6aff2