0% found this document useful (0 votes)
6 views1 page

l4 U05 Assessment

The document outlines learning outcomes and assessment criteria for IT security, categorized into Pass, Merit, and Distinction levels. It includes specific tasks such as identifying security risks, describing organizational procedures, and discussing the impact of IT security measures. Additionally, it emphasizes the importance of risk assessment, data protection, and the management of organizational security policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views1 page

l4 U05 Assessment

The document outlines learning outcomes and assessment criteria for IT security, categorized into Pass, Merit, and Distinction levels. It includes specific tasks such as identifying security risks, describing organizational procedures, and discussing the impact of IT security measures. Additionally, it emphasizes the importance of risk assessment, data protection, and the management of organizational security policies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Assess risks to IT security

P1 Identify types of M1 Propose a method to LO1 & 2


security risks to assess and treat IT security D1 Investigate how a
organisations. risks. trusted network may
P2 Describe organisational be part of an IT security
security procedures. solution.

LO2 Describe IT security solutions

P3 Identify the potential M2 Discuss three benefits


impact to IT security of to implement network
incorrect configuration of monitoring systems with
firewall policies and third- supporting reasons.
party VPNs.
P4 Show, using an example
for each, how implementing
a DMZ, static IP and NAT in
a network can improve
Network Security.

LO3 Review mechanisms to control organisational IT


security

P5 Discuss risk assessment M3 Summarise the ISO D2 Consider how IT


procedures. 31000 risk management security can be aligned
with organisational
methodology and its
P6 Explain data protection policy, detailing the
application in IT security.
processes and regulations security impact of any
as applicable to an M4 Discuss possible misalignment.
organisation. impacts to organisational
security resulting from an
IT security audit.

LO4 Manage organisational security

P7 Design and implement a M5 Discuss the roles of D3 Evaluate the


security policy for an stakeholders in the suitability of the tools
organisation. organisation to implement used in an
security audit organisational policy.
P8 List the main
recommendations.
components of an
organisational disaster
recovery plan, justifying
the reasons for inclusion.

116 P ears on BT EC L evels 4 and 5 H igher N ationals in C omputing


Spec ification I ssue 3 M arch 2 017 © P ears on E ducation L imited 2 017

You might also like