Professional Documents
Culture Documents
Sub-Enabling Outcomes, Related Tasks, Assessment Criteria, Assessment Methods and Assessment Instruments
Sub-Enabling Outcomes, Related Tasks, Assessment Criteria, Assessment Methods and Assessment Instruments
Assessment Instruments
4.5.1 Explain the scope of computer security issues and trends in the study of cybercrime and
computer related security.
a) Identify general concepts of computer security The scope of computer security issues and
trends in the study of cybercrime and computer related security are explained properly
a) Identify lab requirement for computer investigation Evidence and investigation in computer
security laboratory are extracted correctly
4.5.3 Describe the malicious, threats, spy and the effect from causing damage to the computer
system and
Malicious, threats, spy and the effect from causing damage to the computer system and the
whole network
b) Describe the malicious, threats, Spyware the whole network
c) Examine the effect of the malicious, threats, Spyware to computer and mobile device are
described clearly
4.5.4 Describe risks to desktop computers, servers, and mobile computing devices
Risks to desktop computers, servers and mobile computing devices are described appropriately
b) Identify risk of data sharing to networking c) Examine the risk of secure email and web site
4.5.5 Apply the cryptography and symmetric keys for security purposes
Cryptography and symmetric keys for security purposes are applied correctly
a) Identify the hackers Hackers and intruders vulnerabilities are described clearly
e) Examine the vulnerabilities causes by hackers and intruders to computers and mobile devices
4.5.7 Apply the protocols for maintaining confidentiality of email and the web browser
Protocols for maintaining confidentiality of email and the web browser are properly applied
d) Describe IPSEC, Secure sockets layer, Transport Layer Security, Rate control protocol, File
transfer Protocol
a) Identify the security devices and tools Security tools and techniques to identify and exploit
weaknesses in IT systems security are applied correctly