NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0



Similar documents
Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Incident Management Policy

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

External Supplier Control Requirements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Small businesses: What you need to know about cyber security

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

ICASAS505A Review and update disaster recovery and contingency plans

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

How To Manage A Network Safely

How To Protect Decd Information From Harm

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Information Security

Keyfort Cloud Services (KCS)

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR Level 2 CAMBRIDGE TECHNICAL

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Newcastle University Information Security Procedures Version 3

Data Protection Act Bring your own device (BYOD)

Third Party Security Requirements Policy

SFJFRSFF2 SQA Unit Code (FA6J 04) Take responsibility for effective performance in fire and rescue

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

Electronic business conditions of use

Portable Devices and Removable Media Acceptable Use Policy v1.0

DBC 999 Incident Reporting Procedure

Cyber Essentials Scheme

ENISA s ten security awareness good practices July 09

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Infocomm Sec rity is incomplete without U Be aware,

A practical guide to IT security

A Guide to Information Technology Security in Trinity College Dublin

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Information Security Policies. Version 6.1

Managing internet security

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_ Effective of 7 Title: Corporate Information Technology Usage Policy

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Service Children s Education

LAPTOP AND PORTABLE DEVICES AND REMOTE ACCESS POLICY

Information Security Policy

University of Aberdeen Information Security Policy

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

The Education Fellowship Finance Centralisation IT Security Strategy

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Information Security Policy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

How To Protect Your Data From Being Hacked

Decision on adequate information system management. (Official Gazette 37/2010)

Chapter 8: Security Measures Test your knowledge

Information Security Baseline (minimal measures)

Information Security Policy Manual

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Nine Steps to Smart Security for Small Businesses

ULH-IM&T-ISP06. Information Governance Board

Guardian365. Managed IT Support Services Suite

USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY

Using a Firewall General Configuration Guide

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

National Cyber Security Month 2015: Daily Security Awareness Tips

So the security measures you put in place should seek to ensure that:

Version: 2.0. Effective From: 28/11/2014

Security Controls What Works. Southside Virginia Community College: Security Awareness

INFORMATION TECHNOLOGY SECURITY STANDARDS

HP Laptop & Apple ipads

Better protection for customers, and recurring revenue for you!

IT Support & Maintenance Contract

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of Liverpool

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

IT Data Security Policy

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

Course: Information Security Management in e-governance

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

10 Quick Tips to Mobile Security

Transcription:

NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0

NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security procedures for digital systems Review and implement security for digital systems See IT Professional NOS 902 Information Risk Management 905 Operational Security Management

ESKITU040 Use safe and secure practices when working with digital systems Overview This standard is about protecting hardware, software and the data within an IT system against theft, malfunction and unauthorised access. It involves staying safe online, reporting any safety issues and following guidelines about the use of IT. It includes using unique passwords, running virus protection software and backup systems; also protecting digital devices and printed information.

ESKITU040 Use safe and secure practices when working with digital systems Performance criteria You must be able to: 1. take appropriate safeguarding precautions when using the Internet 2. identify when and how to report online safety issues to the appropriate person within organisational timescales 3. comply with any organisational rules governing the use of the Internet 4. run security software as required to protect digital systems from viruses and malware 5. maintain secure systems by using unique and secure PINs and passwords 6. adopt secure practices to protect personal information online in line with organisational guidelines 7. conduct online transactions in line with organisational guidelines 8. take precautions in line with organisational data protection policies to protect against loss or theft of mobile devices and printed information 9. comply with organisational safety and security practices for using digital systems

ESKITU040 Use safe and secure practices when working with digital systems Knowledge and understanding You need to know and understand: 1. how to report breaches of security or suspicious online behaviour 2. the danger of computer viruses, and how to minimise risk 3. the risks to data security when using the internet 4. the risks to user safety and privacy when using the internet 5. security precautions that need to be addressed when connecting to the internet 6. how to identify secure internet sites 7. the need for safety and security practices when working online 8. the concept of password strength 9. the importance of organisational guidelines and policies for aspects of digital security and the implications of breaches of security 10. the use of system-generated passwords and password keepers 11. the risks associated with downloading software

ESKITU041 Set up and use security procedures for digital systems Overview This standard is about protecting hardware, software and the data within an IT system against theft, malfunction and unauthorised access. It involves using appropriate methods to stay safe online and protect software and data, such as by setting up virus protection software and a system for strong passwords.

ESKITU041 Set up and use security procedures for digital systems Performance criteria You must be able to: 1. take appropriate precautions to safeguard self and others when working online 2. report suspicious online activity to the appropriate person within required organisational timescales 3. set up and configure security software as required to protect digital systems from viruses and malware 4. establish an appropriate method for strong password protection 5. protect systems and data against unauthorised use 6. take appropriate steps to protect computer hardware against loss or damage

ESKITU041 Set up and use security procedures for digital systems Knowledge and understanding You need to know and understand: 1. the regulations, governing the security of IT systems including IT health and safety and good practice 2. the reporting requirements for data protection legislation 3. how to recognise problems that may be caused by a virus 4. risks to data and system performance and integrity that can exist when using the Internet 5. risks associated with using public internet access points and networks 6. how to use built-in operating system security features including firewalls 7. how to identify secure websites when conducting transactions online 8. the importance of maintaining good password and PIN security 9. the policies that exist for internet use, codes of conduct, disaster recovery 10. the importance of manufacturer updates for maintaining system security 11. how to select tools and apps that can enhance system and data security

ESKITU042 Review and implement security for digital systems Overview This standard is about protecting hardware, software and the data within an IT system against theft, malfunction and unauthorised access. It involves managing the safety of yourself and others online and maintaining the security of the digital workplace.

ESKITU042 Review and implement security for digital systems Performance criteria You must be able to: 1. identify and review the organisational risks to information, system and user security 2. contribute to the development of relevant organisational policy for user security and safeguarding 3. contribute to the development of relevant procedures for the safe and secure use of digital systems 4. contribute to the development of organisational policy for safe and secure Internet use 5. manage protection against malware and viruses 6. implement procedures to protect systems and data from loss or unauthorised use 7. maintain a secure digital footprint 8. update system security in line with manufacturer recommendations 9. implement appropriate guidelines for mobile device management

ESKITU042 Review and implement security for digital systems Knowledge and understanding You need to know and understand: 1. the regulations, governing the security of IT systems including IT health and safety and good practice 2. the importance of IT asset management and testing in organisations 3. how to protect personal computer systems against virus and malware attack 4. how to recognise a range of different attempts to compromise security 5. how to safeguard self and others when working online 6. how to minimise unwanted internet traffic including pop-ups, adverts, unsolicited messages and images 7. the role of encryption, digital signatures and signed code 8. the importance of maintaining business continuity through periods of disruption of systems or services 9. the different methods employed for user authentication and authorisation 10. issues around the environmental and ethical use of IT 11. where to find information on the security features of the digital system in use and how to configure and enhance device security 12. the low-level hardware and firmware features that protect against viruses and malware