Download it user svq – level 2

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Multilevel security wikipedia , lookup

Mobile device forensics wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Access control wikipedia , lookup

Information privacy law wikipedia , lookup

Information security wikipedia , lookup

Airport security wikipedia , lookup

Unix security wikipedia , lookup

Distributed firewall wikipedia , lookup

Wireless security wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Data remanence wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Mobile security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
IT Practitioners SVQ
Unit Title — DL82 04 Security of ICT Systems Level 1
Skills and Techniques
a
Use specified security tools to identify breaches of security:
o Using internal system tools (e.g. passwords, anti-virus software, firewalls and encryption facilities)
o Using external tools (e.g. access control devices)
b
Comply with organisational security procedures.
Knowledge and Understanding (K & U)
1
Know specified data protection methods:
o Anti-virus software;
o Use and protection of passwords or access codes;
o Backup and storage.
2
Know specified methods of providing physical security for ICT systems:
o Access control devices (e.g. locks, biometric controls, CCTV);
o Limiting visibility of data (e.g. by positioning of monitors, using encryption);
o Shielding (e.g. cable screening, Faraday cages);
3
Know relevant organisational security procedures.
4
Know what type of security breaches can occur at work:
o Unauthorised use of a system without damage to data;
o Unauthorised removal or copying of data or code from a system;
o Damage to or destruction of physical system assets and environment;
o Damage to or destruction of data or code inside or outside the system
SQA – IT Practitioner SVQ - March 2005
IT Practitioners SVQ — Level 1
Candidate Name: __________________________
(Please Print Name)
Unit Title — Security of ICT Systems Level 1
Assessor Name:
_____________________________
(Please Print Name)
Comply with Relevant Security Requirements
Ref
No.
Skills & Techniques
covered
e.g. a, b, etc.
Evidence Description
(Minimum of two straightforward tasks)
K&U
covered
e.g. 1, 2 , etc.
Unit complete
I confirm that all evidence (including knowledge and understanding), for the entire unit has been met.
Candidate Signature:
___________________________ Date:____________
Internal Verifier Signature:
Assessor Signature:
___________________________Date: ____________
Date Sampled (by IV): _____________________
SQA – IT Practitioner SVQ - March 2005
_____________________