ESKISP6053.01 Assist security testing, under supervision



Similar documents
ESKISP Conduct security testing, under supervision

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

ESKISP Manage security testing

Overview TECHIS Carry out security testing activities

ESKISP Conducts vulnerability assessment under supervision

ESKISP Direct security testing

Overview TECHIS Carry out risk assessment and management activities

ESKITP4082 IT/Technology Infrastructure Design and Planning Level 2 Role

ESKITP6026 IT Security Management Level 6 Role

ESKISP Direct security architecture development

ESKITP7102 IT/Technology Asset and Configuration Management Level 2 Role

ESKITP5022 Software Development Level 2 Role

ESKITP Assist in the preparation of change management plans and assignments for IT enabled systems 1

ESKITP5023 Software Development Level 3 Role

ESKITP7072 IT/Technology Capacity Management Level 2 Role

Contribute to IT architecture work

ESKITP6036 IT Disaster Recovery Level 5 Role

Overview TECHIS Carry out security architecture and operations activities

Overview TECHIS Manage information security business resilience activities

ESKITP6034 IT Disaster Recovery Level 4 Role

ESKITP Design and implement change management plans for IT enabled systems 1

ESKITP Identify change management opportunities and options for IT enabled systems 1

ESKITP5022v2 Perform software development activities under direction

ESKITP6033 IT Disaster Recovery Level 3 Role

ESKITP7052 IT/Technology Management and Support Level 2 Role

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM

Committees Date: Subject: Public Report of: For Information Summary

ESKITP Authorise strategy, policies and standards relating to IT service delivery performance metrics management

Data Security Policy THE CTA. Guardian Electrical Solutions Ltd DATA SECURITY POLICY. Reviewed and approved by the Company Secretary Richard Roebuck

ESKITP Implement procedures and standards relating to metrics for IT service delivery

ESKITP7082 Change and Release Management Level 2 role

ESKITP7022 IT/Technology Service Help Desk and Incident Management Level 2 Role

CBEST FAQ February 2015

ESKIPU1 Improving productivity using IT

REPORT. Next steps in cyber security

G-Cloud Definition of Services Security Penetration Testing

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions

How To Assess A Critical Service Provider

ESKITP7025 IT/Technology Service Help Desk and Incident Management Level 5 Role

ESKITP7026 IT/Technology Service Help Desk and Incident Management Level 6 Role

How To Manage Risk On A Scada System

Managing cyber risk the global banking perspective

FINPP07 Support the ongoing client relationship

ESKITP5064 Software Development Process Improvement Level 4 Role

JOB DESCRIPTION CONTRACTUAL POSITION

CFASAA231 - Sqa Unit Code H4RT 04 Use IT to support your role

FSPCOMP3 Assess and mitigate the compliance risks relevant to your organisation

External Supplier Control Requirements

ESKIPIM2 (SQA Unit Code - F9AD 04) Personal information management software

CFAM&LBB2 Develop, maintain and evaluate business continuity plans and arrangements

Information Technologies for Homeland Security Program Assessment Plan 5/3/2011

BIG DATA TRIAGE & DIGITAL FORENSICS

CFACC29 Develop and enhance performance management in a contact centre

Cyber Essentials Scheme

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Prof. Udo Helmbrecht

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

IMPBG404S Maintain partnerships for working in the food supply chain

Confident in our Future, Risk Management Policy Statement and Strategy

National Occupational Standards. Compliance

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Please see the full job description at the end of this document for full details on the Qualifications and Experience required for this role.

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

ESKITP6032 IT Disaster Recovery Level 2 Role

FSPAMFPI01 Provide an administrative service for mortgage and/or financial planning clients

ESKICAS1 Computerised accounting software

Cyber Essentials Scheme. Summary

NOS for Data Management (801) September 2014 V1.3

LEICESTERSHIRE COUNTY COUNCIL RISK MANAGEMENT POLICY STATEMENT

SEMETS3-72 Performing computer system security assessments for engineering software

Cybersecurity and internal audit. August 15, 2014

State of the Applications : Only 11% of Information Security Managers Feel Their Applications are Secure. 1/11

Cyber Security - What Would a Breach Really Mean for your Business?

ESKIWP1 Word processing software

Digital Industries Apprenticeship: Occupational Brief. Cyber Security Technologist. April 2016

FSPPP07 Support the ongoing client relationship

Securing the Microsoft Environment Using Desktop Patch Management

Professional Capability Framework - Senior Social Worker

Security Testing for Web Applications and Network Resources. (Banking).

Cyber Security Evolved

CFABAI132 Inform and facilitate organisational decision-making

DEPARTMENT OF MEDICAL ASSISTANCE SERVICES VULNERABILITY ASSESSMENT AND NETWORK PENETRATION TEST JUNE 2009

BUSINESS CONTINUITY POLICY. UHB 050 Version No: 4 Previous Trust / LHB Ref No: Interim Civil Contingencies and Emergency Planning Manager

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

ESKIDMS1 Database management software

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

Patch and Vulnerability Management Program

How To Check If A System Is Secure

Ensuring security the last barrier to Cloud adoption

ESKIPM3 Project management software

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Spillemyndigheden s Certification Programme Instructions on Vulnerability Scanning

Business Continuity Business Continuity Management Policy

ESKIPM2(SQA Unit Code- F9CX 04) Project management software

Unit 3 Cyber security

A Guide to the Cyber Essentials Scheme

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

Promote security system and service sales

FREQUENTLY ASKED QUESTIONS

Transcription:

Overview This standard covers the competencies required to assist security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to information security threats and vulnerabilities. Assisting applying testing methods, including penetration testing, assessing the robustness of an information system, against a coordinated attack. ESKISP6053.01 1

Performance criteria You must be able to: P1 P2 P3 P4 P5 P6 P7 able to assist in determining responses to a range of standard security scans and tests on network devices and information systems and components use a range of appropriate methods, tools and techniques, as directed by supervisors/senior staff, to conduct information security testing undertake a range of basic penetration tests, under controlled conditions, to assess vulnerabilities and compliance against information assurance criteria and standards under supervision assist with the development of accurate and clear security test scripts to ensure that information assurance requirements can be tested against relevant standards objectively assess the results of information security testing and vulnerability assessment against the acceptance criteria accurately collate and clearly document the outcomes from information security tests and vulnerability assessment providing prioritised rudimentary mitigation information and advice report potential issues and risks arising from security testing to supervisors ESKISP6053.01 2

Knowledge and understanding You need to know and understand: K1 K2 K3 K4 the range of threats and vulnerabilities that need to be considered within information security testing design and development activities when and how to schedule information security testing the range of formal testing methods/standards that are available what are acceptable results from information security testing K5 K6 K7 K8 K9 how to: K5.1 use and apply specified penetration testing techniques under supervision K5.2 develop information security test plans and schedules K5.3 design and apply a range of tests to ensure compliance with the information assurance standards used by the organisation K5.4 ensure that information security tests are carried out under controlled conditions K5.5 assess the results from information security testing objectively K5.6 accurately record and store relevant information and data relating to the results of information security tests what is meant by information security testing what are the different types of information security testing that can be conducted and their purpose what is the role of penetration testing in information security testing what are the legal requirements for penetration testing K10 that the purpose of information security testing is about attaining levels of confidence in the resilience properties of information systems ESKISP6053.01 3

K11 how to apply a few conventional, accepted penetration testing techniques K12 that information security testing does not guarantee security, simply that a device, information systems or component meets a minimum threshold of security robustness K13 that there are a range of different testing methods and standards that can be associated with and applied to each stage of software or hardware life cycle K14 how to apply an established testing method to assure information systems K15 the need to ensure that compliance with information security standards is tested prior to the launch of any developed information system or solution K16 the importance of conducting information security tests routinely on existing services within the organisation ESKISP6053.01 4

Developed by e-skills UK Version number 1 Date approved February 2013 Indicative review date Validity Status Originating organisation Original URN Relevant occupations Suite Key words December 2015 Current Original e-skills UK ESKISP6053.01 Information and Communication Technology; Information and Communication Technology Professionals; Information and Communication Technology Officer; IT Service Delivery Occupations; Software Development Information Security Cyber Security; Information Security ESKISP6053.01 5