The document outlines learning outcomes and assessment criteria for IT security, categorized into Pass, Merit, and Distinction levels. It includes specific tasks such as identifying security risks, describing organizational procedures, and discussing the impact of IT security measures. Additionally, it emphasizes the importance of risk assessment, data protection, and the management of organizational security policies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views1 page
l4 U05 Assessment
The document outlines learning outcomes and assessment criteria for IT security, categorized into Pass, Merit, and Distinction levels. It includes specific tasks such as identifying security risks, describing organizational procedures, and discussing the impact of IT security measures. Additionally, it emphasizes the importance of risk assessment, data protection, and the management of organizational security policies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Learning Outcomes and Assessment Criteria
Pass Merit Distinction
LO1 Assess risks to IT security
P1 Identify types of M1 Propose a method to LO1 & 2
security risks to assess and treat IT security D1 Investigate how a organisations. risks. trusted network may P2 Describe organisational be part of an IT security security procedures. solution.
LO2 Describe IT security solutions
P3 Identify the potential M2 Discuss three benefits
impact to IT security of to implement network incorrect configuration of monitoring systems with firewall policies and third- supporting reasons. party VPNs. P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a network can improve Network Security.
LO3 Review mechanisms to control organisational IT
security
P5 Discuss risk assessment M3 Summarise the ISO D2 Consider how IT
procedures. 31000 risk management security can be aligned with organisational methodology and its P6 Explain data protection policy, detailing the application in IT security. processes and regulations security impact of any as applicable to an M4 Discuss possible misalignment. organisation. impacts to organisational security resulting from an IT security audit.
LO4 Manage organisational security
P7 Design and implement a M5 Discuss the roles of D3 Evaluate the
security policy for an stakeholders in the suitability of the tools organisation. organisation to implement used in an security audit organisational policy. P8 List the main recommendations. components of an organisational disaster recovery plan, justifying the reasons for inclusion.
116 P ears on BT EC L evels 4 and 5 H igher N ationals in C omputing