Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Sub-Enabling Outcomes, Related Tasks, Assessment Criteria, Assessment Methods and

Assessment Instruments

4.5.1 Explain the scope of computer security issues and trends in the study of cybercrime and
computer related security.

a) Identify general concepts of computer security The scope of computer security issues and
trends in the study of cybercrime and computer related security are explained properly

b) Describe trend of computer security

c) Identify the cybercrime

d) Apply computer security protocol to network

e) Identify the Network Security

4.5.2 Extract evidence and investigation in computer security laboratory

a) Identify lab requirement for computer investigation Evidence and investigation in computer
security laboratory are extracted correctly

b) Describe the security Information

c) Describe components for investigation

d) Identify tool measurement for investigation

e) Identify electronic investigation

4.5.3 Describe the malicious, threats, spy and the effect from causing damage to the computer
system and

a) Identify the malicious, threats, Spyware

Malicious, threats, spy and the effect from causing damage to the computer system and the
whole network
b) Describe the malicious, threats, Spyware the whole network

c) Examine the effect of the malicious, threats, Spyware to computer and mobile device are
described clearly

d) Examine the effect of the malicious, threats, Spyware to computer network

4.5.4 Describe risks to desktop computers, servers, and mobile computing devices

a) Identify the risks to computer data

Risks to desktop computers, servers and mobile computing devices are described appropriately

b) Identify risk of data sharing to networking c) Examine the risk of secure email and web site

d) Describe the risk of server and its application

4.5.5 Apply the cryptography and symmetric keys for security purposes

a) Identify public and private key Cryptography

Cryptography and symmetric keys for security purposes are applied correctly

b) Identify the cryptography and symmetric keys

c) Identify the key distribution for symmetric cryptography

d) Describe the cryptography and network security

e) Describe strengths and weaknesses of public key cryptography

f) Examine cryptography and data security

4.5.6 Describe the hackers and Intruders vulnerabilities

a) Identify the hackers Hackers and intruders vulnerabilities are described clearly

b) Identify the Intruders

c) Describe the effect of hackers to computer and mobile devices


d) Examine the effect of intruders to computer networking

e) Examine the vulnerabilities causes by hackers and intruders to computers and mobile devices

4.5.7 Apply the protocols for maintaining confidentiality of email and the web browser

a) Identify techniques for maintaining web confidentiality

Protocols for maintaining confidentiality of email and the web browser are properly applied

b) Identify techniques for secure web transaction

c) Describe Security, privacy, and confidentiality issues on the Internet

d) Describe IPSEC, Secure sockets layer, Transport Layer Security, Rate control protocol, File
transfer Protocol

Apply security tools and techniques to identify exploitability of weaknesses in IT systems


security

a) Identify the security devices and tools Security tools and techniques to identify and exploit
weaknesses in IT systems security are applied correctly

b) Describe the application of the security tools

c) Examine the weakness of the IT system security

d) Applying tools for security and computer and networking

4.6.1 Apply network analysis technique in planning organizational processes

a) Determine network techniques

Network analysis technique is correctly applied in planning

You might also like