Learning aims C and D For Distinction standard , learners will draw on their knowledge to produce an
evaluation of a cyber security plan, including its impact on internal policies and external
service providers. Learners will also evaluate the impact forensic investigations can have
on an organisation.
The evaluation will be informed by a balanced, wide-ranging review of the security plan
and the impact on organisations of undergoing a forensic investigation into their
IT systems.
Learners will use appropriate technical language consistently to communicate
their ideas.
For Merit standard , learners will provide a clear, accurate and well-balanced analysis of
how forensic procedures are implemented on suspect systems. They should consider all
forensic procedures in the unit content as a guide. Learners should also provide clear
justifications of security measures used to defend the IT systems of a given organisation.
For Pass standard , learners will carry out a risk assessment of the system vulnerabilities
of a given organisation. They will create a cyber security plan for the given organisation
as well as explore the forensic procedures for collection of evidence during a forensic
investigation.
Learners will explore how forensic procedures can be used to collect evidence on a
suspect system.
Assessment controls Time: this assignment has a recommended time period. This is for advice only and can
be adjusted depending on the needs of learners.
Supervision: you should be confident of the authenticity of learner's work. This may
mean that learners be supervised.
Resources: all learners should have access to the same types of resources to complete
the assignment.
Research: learners should be given the opportunity to carry out research outside of the
learning context if required for the assignment.