Unit 3 Cyber security

Similar documents
Unit 22 Big Data analytics

Unit 21 Web design and prototyping

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

Unit 8 Project management

Unit 13 Social media and digital marketing

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL

PERFORMING ARTS. Unit 31 Technical management Suite. Cambridge TECHNICALS LEVEL 3. L/507/6842 Guided learning hours: 60

OCR Level 2 CAMBRIDGE TECHNICAL

DIGITAL MEDIA. Unit 20 Advertising media Suite. Cambridge TECHNICALS LEVEL 3. R/507/6406 Guided learning hours: 60. ocr.org.

External Supplier Control Requirements

External Supplier Control Requirements

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

A practical guide to IT security

How To Protect Decd Information From Harm

Information Security It s Everyone s Responsibility

Nine Steps to Smart Security for Small Businesses

Mitigating and managing cyber risk: ten issues to consider

CESG Certification of Cyber Security Training Courses

Data Access Request Service

Identifying Cyber Risks and How they Impact Your Business

Policy Document. Communications and Operation Management Policy

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Cybersecurity: What CFO s Need to Know

How To Cover A Data Breach In The European Market

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Small businesses: What you need to know about cyber security

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Information security controls. Briefing for clients on Experian information security controls

Cybercrime: risks, penalties and prevention

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

CompTIA Security+ (Exam SY0-410)

Third Party Security Requirements Policy

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Bellevue University Cybersecurity Programs & Courses

Managing internet security

HEALTH AND SOCIAL CARE E QUALIFICATIONS HE UNIT HSC 028

Connect Smart for Business SME TOOLKIT

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

The Impact of Cybercrime on Business

Rulebook on Information Security Incident Management General Provisions Article 1

Cyber Risks and Insurance Solutions Malaysia, November 2013

The Ministry of Information & Communication Technology MICT

HIPAA Compliance Evaluation Report

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Technology Risk Management

HEALTH AND SOCIAL CARE

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Network Security Policy

TECHNICALS LEVEL BUSINESS

Security + Certification (ITSY 1076) Syllabus

HEALTH AND SOCIAL CARE

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Networked Systems Security

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

Working Practices for Protecting Electronic Information

BUSINESS. Unit 7 Marketing campaign Suite. Cambridge TECHNICALS LEVEL 3. L/507/8154 Guided learning hours: 60. ocr.org.

Cyber and Data Security. Proposal form

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

SECURITY CONSIDERATIONS FOR LAW FIRMS

Bootstrapping Secure Channels of Communication Over Public Networks

Data Protection Act Bring your own device (BYOD)

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Cyber Essentials Scheme

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Central and Eastern European Data Theft Survey 2012

Information Security Team

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Big Data, Big Risk, Big Rewards. Hussein Syed

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Jort Kollerie SonicWALL

developing your potential Cyber Security Training

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Privacy and Electronic Communications Regulations

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Information Security Policy

INFORMATION TECHNOLOGY SECURITY STANDARDS

Information Security Services

Guidance on data security breach management

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

IT Security Incident Management Policies and Practices

University of Liverpool

Top tips for improved network security

Data Security Incident Response Plan. [Insert Organization Name]

Network & Information Security Policy

AQA LEVEL 3 FOUNDATION TECHNICAL LEVEL IT: CYBER SECURITY (360GLH) AQA LEVEL 3 TECHNICAL LEVEL IT: CYBER SECURITY AND SECURITY ADMINISTRATION (720GLH)

Transcription:

2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it

LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours: 60 Essential resources required for this unit: none This unit is externally assessed by an OCR set and marked examination. UNIT AIM The need for secure digital systems is more crucial than ever before. We rely on computerised systems and networks to collect, process, store and transfer vast amounts of data and to control critical systems such as water and power supplies. Business and e- commerce can be undertaken twenty four hours a day, seven days a week and telecommunications enable us to keep in touch with family and friends and collaborate with colleagues at any time. Mobile devices offer us freedom and flexibility of where and how we learn and work. However, for all the advantages that these systems offer us, some people have found ways to exploit them and this poses a threat to our safety and security in the real world, as much as in the cyber world. To deal with this problem the cyber security industry is expanding at a rapid rate. This unit has been designed to enable you to gain knowledge and understanding of the range of threats, vulnerabilities and risks that impact on both individuals and organisations. You will learn about the solutions that can be used to prevent or deal with cyber security incidents resulting from these challenges. You will be able to apply your knowledge and understanding of cyber security issues and solutions by reviewing and making recommendations for ways to best protect digital systems and information. Learning within this unit will also support the delivery of the Cisco Cyber Security and CompTIA A+, CompTIA Security+, CompTIA Mobility+ qualifications. The unit also makes reference to UK government cyber security initiatives, for example, the UK government s The UK Cyber Security Strategy, Cyber Essentials Scheme, 10 Steps Strategy, and Cyber Streetwise. OCR 2015 2

TEACHING CONTENT The teaching content in every unit states what has to be taught to ensure that learners are able to access the highest grades. Anything which follows an i.e. details what must be taught as part of that area of content. Anything which follows an e.g. is illustrative. For externally assessed units, where the content contains i.e. and e.g. under specific areas of content, the following rules will be adhered to when we set questions for an exam: a direct question may be asked about unit content which follows an i.e. where unit content is shown as an e.g. a direct question will not be asked about that example. Learning outcomes Teaching content Exemplification The Learner will: 1. Understand what is meant by cyber security Learners must be taught: 1.1 Cyber security aims to protect information, i.e.: confidentiality (e.g. protect it from unauthorised access, use, inspection and disclosure) integrity (e.g. protect it from unauthorised modification) availability (e.g. protect it from unauthorised destruction) 1.2 Types of cyber security incidents, i.e.: unauthorised access (e.g. hacking, escalation of privileges) information disclosure (e.g. personal information, government information) modification of data (e.g. impairing the data, impairing the operation of a digital system) inaccessible data (e.g. account lockout, denial of service) destruction (e.g. using malware, deliberate erasure) Learners should know what is meant by the term cyber security. They should know about digital systems and understand why the information stored on them needs to be kept secure at all times. Leaners should know about the types and nature of cyber security incidents that affect individuals, states and organisations. This should lead to an understanding of the importance of cyber security in that that there are different types of data that need to be secured, whether it be at individual, organisation or state level. OCR 2015 3 Unit 3: Cyber security

Learning outcomes Teaching content Exemplification The Learner will: Learners must be taught: 2. Understand the issues surrounding cyber security theft (e.g. identity, finance, military secrets) 1.3 The importance of cyber security, i.e.: the need to protect personal data (e.g. health, financial, national insurance) the need to protect an organisation s data (e.g. financial, research, development plans) the need to protect a state s data (e.g. economic data, national security) 2.1 Threats to cyber security, i.e. vulnerabilities o system attacks (e.g. denial of service, botnet, malware, social engineering) o physical threats (e.g. theft) o environmental (e.g. floods, natural disasters) accidental (e.g. responding to hoax email) intentional (e.g. attacks from hackers, etc.) organised crime (e.g. cyber dependant and cyber enabled crime) state sponsored (e.g. spying, espionage) 2.2 Types of attackers, i.e.: hacktivist cyber-criminal insider (e.g. disgruntled employee) script kiddie (e.g. bored youth) vulnerability broker (e.g. hacking as a business) scammers phishers cyber-terrorists characteristics (e.g. age, location, social group) Learners should know about the wide range of threats to cyber security including those threats that are unavoidable, accidental or intentional. Learners should know about the types of attacker, their characteristics and their motivations. OCR 2015 4 Unit 3: Cyber security

Learning outcomes Teaching content Exemplification The Learner will: Learners must be taught: 2.3 Motivation for attackers, i.e.: espionage writing perceived wrongs publicity fraud score settling public good thrill income generation 2.4 Targets for cyber security threats, i.e.: people (e.g. individuals at home, online customers, social media sites) organisations (e.g. small businesses, multinational organisations, charities, banks, retail, industry, transport, utilities, hospitals, telecommunications, governments, defence, education, the media) equipment (e.g. mobile devices and apps, smart devices) information (e.g. personal, financial, business, research) 2.5 Impacts of cyber security incidents, i.e.: global problem (e.g. individuals, organisations and states) loss (e.g. confidentiality, integrity, availability, data, finance, business, identity, reputation, customer confidence) disruption (e.g. people s lives, business, industry, transport, industry, the media, utilities) Learner should know about the different targets for cyber security threats and how these threats might manifest themselves. This should lead to an understanding of the possible impacts from cyber security incidents and how these affect different stakeholders in a variety of different ways. OCR 2015 5 Unit 3: Cyber security

Learning outcomes Teaching content Exemplification The Learner will: Learners must be taught: safety (e.g. identity theft, oil installations, traffic control) 2.6 Other considerations of cyber security, i.e.: ethical (e.g. ethical hacking, monitoring of emails vs privacy) legal (e.g. Data Protection Act 1998, The Telecommunications (Lawful Business Practice), (Interception of Communications) Regulations 2000, Regulation of Investigatory Powers Act 2000, Computer Misuse Act 1990) operational (e.g. use of encryption, use of surveillance) implications for stakeholders Learners should know about other cyber security considerations. This should lead to an understanding of the implications for different stakeholders in this wider context. 3. Understand measures used to protect against cyber security incidents 3.1 Cyber security risk management, i.e.: identify assets and analyse risks (e.g. identify data and potential areas for data theft) mitigate risks by: o o testing for potential vulnerabilities monitoring and controlling systems (e.g. monitor/control networks) protect vulnerabilities cost/benefit 3.2 Testing and monitoring measures, i.e.: vulnerability testing (e.g. penetration testing, fuzzing, security functionality, sandboxing) intrusion detection systems (IDS) (e.g. network intrusion detection systems (NIDS), host intrusion detection systems (HIDS), distributed intrusion Learners should know about the various measures that should be taken to manage cyber security. This should lead to an understanding of, and justification for, different measures that can be taken in a given context. Learners should know about different testing and monitoring measures that can be used to test for vulnerabilities. This should lead to an understanding and justification of the effectiveness of different measures in a given context. OCR 2015 6 Unit 3: Cyber security

Learning outcomes Teaching content Exemplification The Learner will: Learners must be taught: detection system (DIDS), anomaly-based, signature-based, honeypots) intrusion prevention systems (IPS) (e.g. incident logging, audit trails) effectiveness 4. Understand how to manage cyber security incidents. 3.3 Cyber security controls (access controls), i.e.: physical (e.g. biometric access, swipe cards, alarms) hardware (e.g. cable locks, safes) software (e.g. firewalls, anti-malware, operating system updates, patch management) data (e.g. in use, at rest, in-transit, in the cloud) encryption (e.g. disks, databases, files, removable media, mobile devices) cryptography (storing and transmitting data in a particular form so that only intended recipients can read and process it) devices (e.g. hard drives, external drives, USBs) procedures (e.g. access management, data backup, remote working, device management, user accounts and permissions, awareness and training) characteristics 4.1 Responding to an incident, i.e.: know responsibilities (e.g. own, personnel in an organisation) know who to contact (e.g. response and recovery teams, such as Cisco Security Incident Response Team (CSIRT) know procedures (e.g. Cisco s playbook) know the extent of the incident (if a malware issue, Learners should know about the different security controls and their characteristics. This should lead to an understanding and justification of the effectiveness of different controls in a given context. Learners should know about different procedures that should be followed in the event of a cyber security incident. This may include conducting forensic investigation or having forensic investigations to be carried out. This should lead into an understanding and justification of why certain procedures should be taken in a given context. OCR 2015 7 Unit 3: Cyber security

Learning outcomes Teaching content Exemplification The Learner will: Learners must be taught: determine what is infected) contain the incident (e.g. stop further infection if malware) eradicate the incident reduce the impact of the incident recover from the incident (e.g. a disaster recovery plan, a business continuity plan) confirm the system is functioning normally 4.2 Cyber security incident report, i.e.: incident title and date of incident target of the incident (e.g. organisation) incident category, i.e.: o critical (e.g. loss of life, critical system safety) o significant (e.g. considerable disruption/loss) o minor (e.g. inconvenient) o negligible (e.g. minimal loss/disruption) description of the incident type of attacker(s) (e.g. lone hacker) purpose of incident (e.g. financial theft) techniques used by the attacker(s) (phishing) capability of attacker(s) (e.g. experienced) impact of the incident (on business, data, recovery time) cost of the incident (e.g. significant, minimal) responses needed (e.g. technical, legal) future management o review (of incident) o evaluation to include identification of trends o update of documentation, key information, procedures and controls o recommendations of changes Learners should know the various stages of investigation that should be undertaken should a cyber security incident occur. This should lead to an understanding of, and justification for decisions that must be taken in a given context. It is possible learners will be asked to complete sections of a cyber security report as part of the examination for this unit. OCR 2015 8 Unit 3: Cyber security

LEARNING OUTCOME (LO) WEIGHTINGS Each learning outcome in this unit has been given a percentage weighting. This reflects the size and demand of the content you need to cover and its contribution to the overall understanding of this unit. See table below: LO1 5-15% LO2 35-45% LO3 20-30% LO4 10-20% ASSESSMENT GUIDANCE All LOs are assessed through externally set written examination papers, worth a maximum of 60, marks and 1 hour in duration. Learners should study the meaning of cyber security and gain an understanding of its overall purpose. They should study the wide variety of issues surrounding cyber security and the measures that are used to protect against cyber security incidents. Breaches in cyber security can cause serious issues to individuals and organisations and, therefore, learners should have a good understanding of how to manage cyber security incidents. Exam papers for this unit will include a pre-released case study. The paper will include questions associated with the pre-released case study as well as questions to demonstrate a more general understanding of the subject. Questions will provide sufficient information to support the application and interpretation of the taught content of the unit. During the external assessment, learners will be expected to demonstrate their understanding through questions that require the skills of analysis and evaluation in particular contexts. Some providers for the industry qualifications offer quizzes, tests and assessments. Reference to these websites may support knowledge and learning. www.comptia.org www.cisco.com/uk OCR 2015 9 Unit 3: Cyber security

EMPLOYABILITY SKILLS Employability skills Communication Critical thinking Decision making Learning outcome LO4 LO1, LO2, LO3, LO4 LO1, LO2, LO3, LO4 OCR 2015 10 Unit 3: Cyber security

MEANINGFUL EMPLOYER INVOLVEMENT - a requirement for the Foundation Diploma and Diploma (Tech Level) qualifications The Diploma qualifications have been designed to be recognised as Tech Levels in performance tables in England. It is a requirement of these qualifications for centres to secure for every learner employer involvement through delivery and/or assessment of these qualifications. The minimum amount of employer involvement must relate to at least one of the mandatory units (this unit is a mandatory unit in all specialist pathways in the Level 3 Cambridge Technical Diploma in IT (720 GLH)), although we encourage you to find ways to engage with employers for other units as well. Eligible activities and suggestions/ideas that may help you in securing meaningful employer involvement for this unit are given in the table below. Please refer to the Qualification Handbook for further information including a list of activities that are not considered to meet this requirement. Meaningful employer involvement 1. Learners undertake structured work-experience or workplacements that develop skills and knowledge relevant to the qualification. 3. Learners take one or more units delivered or co-delivered by an industry practitioner(s). This could take the form of master classes or guest lectures. Suggestion/ideas for centres when delivering this unit As part of a learners work experience they could find out what procedures the business has in place to manage cyber security incidents and how the business protects itself against cyber security incidents (LO3/LO4) An Industry Practitioner could be used to present a guest lecture on how they manage cyber security in their company (LO3). OCR 2015 11 Unit 3: Cyber security

To find out more ocr.org.uk/it or call our Customer Contact Centre on 02476 851509 Alternatively, you can email us on vocational.qualifications@ocr.org.uk Oxford Cambridge and RSA OCR is part of Cambridge Assessment, a department of the University of Cambridge. For staff training purposes and as part of our quality assurance programme your call may be recorded or monitored. OCR 2015 Oxford Cambridge and RSA Examinations is a Company Limited by Guarantee. Registered in England. Registered office 1 Hills Road, Cambridge CB1 2EU. Registered company number 3484466. OCR is an exempt charity.