Professional Documents
Culture Documents
r accounts are controlled Detect and remove destructive software Identify and take action to stop spam Demonstration with Oral Questioning
Observation
Written Test
Modify default user settings to ensure that they conform to security policy Previously created user settings are modified to ensure they conform to updated security policy Ensure legal notices displayed at logon are appropriate Appropriate utilities are used to check strength of passwords and consider tightening rules for password complexity
information services are accessed to identify security gaps and take appropriate action using hardware and software or patches
Common types of destructive software are defined and identified Virus protection compatible with the operating system in use are selected and installed Advanced systems of protection are described in order to understand further options Software updates on a regular basis are installed
Interview
LAP Test
Software security settings are configured to prevent destructive software from infecting computer Virus protection software are run and/or scheduled on a regular basis
Detected destructive software are reported to appropriate person and remove the destructive software
Common types of spam are defined and identified Appropriate action is taken in order to protect unauthorized access of spammers Spam filters are configured and used
Spams are reported and documented to identify the security threats and be able to perform recommended action Prepared by: Checked by: Date: Date:
Demonestration
Students Name: Teachers Name: Learning Module Title: Learning Outcome covered: Batch Class: Date of assessment: Time of assessment: Instructions for demonstration Thenewcomputersarerunningwell,thenetworkandbackuproutinesaregreat,and boththenursesandmanagementareveryhappy.Butyourworkisnotoveryet;the nursesstationcomputersareconnectedtotheInternettoallowforinvestigationonthe latestprescribeddrugsandmedicaltreatments. Thismeansthatthecomputersaregoingtobevulnerabletoviruses,aswellasspam throughtheemailbrowser.Somedatafilesarealsotransportedbetweencomputerson externalstoragemedia,sothisalsopresentsadatasecurityproblem. Materials and equipment
OBSERVATION
Yes
No
N/A
in the wild, and the possible ways they can be contracted. Then write up the steps that will be required to eradicate this virus. Naturally this will depend on the anti-virus software you recommend. Investigate the latest quality anti-virus software available. Find out its costs, as well as the regularity of software signature updates. Make sure you find out the cost for a site license for the software, if available. Make sure the software company has adequate help desk facilities. When you are investigating this anti-virus software find out about spam detection software to protect the organizations emails. Write up a handout explaining what a virus is, and how it can affect the nurses computers. Also explain Trojans and worms, as well as how spam can infect the organizations emails. Write up a brief explanation of the various types of viruses currently in the wild, and the possible ways they can be contracted.
Not Satisfactory
Oral Questioning / Interview Students Name: Teachers Name: Batch Class: Learning Module Title: Learning Outcome/s covered: Oral/interview questions
1. Are all viruses harmful? 2. What is a Trojan horse?
No
How do I prevent viru The students underpinning knowledge was: Satisfactory Teachers Signature: Feedback to student: Date: Not satisfactory
Written test True or False 1. A virus can have a devastating effect on a computer o True False
2. A Trojan is a virus that infects a computer by attaching to a legitimate program o True False
3. A virus worm sits on your hard drive waiting for a certain 'trigger' situation o True False
5. A virus cannot move from your floppy disk to your hard drive if your floppy disk is locked o True o True False False 6. Anti-virus software is unnecessary if you don't use illegal software
10. Sometimes a virus can only be eradicated by formatting your hard drive
o True
False
11. A software register is used to keep track of both software and hardware within an organization o True False
12. SPAM is a number of emails which have been sent by an organization you asked for information o True False
13. A software register is used to keep track of an organisations software. 14. True False
Did the students overall performance meet the required evidences / standards? OVERALL EVALUATION
COMPETENT
Date: Date: