Select, use and develop appropriate procedures to monitor and minimise security risk to IT systems and data
Assessment Criteria
-
1.1
Evaluate the security issues that may threaten system performance
-
1.2
Select, use and evaluate a range of security precautions to protect IT systems and monitor security
-
1.3
Evaluate the threats to system and information security and integrity
-
1.4
Manage access to information sources securely to maintain confidentiality, integrity and availability of information
-
1.5
Explain why and how to minimise security risks to hardware, software and data for different users
-
1.6
Apply, maintain and develop guidelines and procedures for the secure use of IT