Unit 11 Psa PDF
Unit 11 Psa PDF
Brief
Assessment date
The Pearson Set Assignment will be assessed internally by the centre using the unit
assessment criteria given in the qualification specification. The Set Assignment will be sampled
by the Standards Verifier as part of the standards verification annual centre visit.
Conditions of supervision
The Pearson Set Assignment must be carried out under supervised conditions. We advise that
the Set Assignment can be in more than one supervised session.
The Set Assignment must not be shared with learners before the supervised session that will
be arranged by the centre. Tutors and invigilators should take note that they are responsible
for maintaining security and for reporting issues to Pearson. In particular:
You will be asked to carry out specific written activities, under supervised conditions, using the
information provided.
At all times you must work independently and must not share your work with other learners.
You work for a new cyber security company called ‘Cyber R Us’ who are delivering
security products and services across the entire information technology infrastructure.
The company develops cybersecurity software including firewalls, anti-virus, intrusion
detection and protection, and endpoint security. Cyber R Us are tasked with
protecting companies’ networks, clouds, web applications and emails. They also offer
advanced threat protection, secure unified access, and endpoint security.
One of the clients (International Money Transfer Limited (Ltd)) of Cyber R Us has tasked the
company to investigate the security implications of developing an internet-based financial
transfer application, which allows people to transfer money quickly and cheaply to friends and
family both at home and abroad.
The director of the company understands such a system would be the target for cyber-attacks.
As you have recently completed a BTEC course which included a unit in cyber security, the
director has asked you to investigate and report on potential cyber security threats to their
web site and software.
Set Assignment
Produce a report that evaluates the security threats to International Money Transfer Ltd and
how these threats can be overcome.
The director of Cyber R Us was pleased with your report on cyber security threats. He would
now like you to assist with one of the company’s other clients, Black Country Training and
Assessment (BCTAA) and investigate how Cyber R Us can help them to implement a cyber
security plan.
For this activity you must refer to the case study on BCTAA. Read the case study carefully
before attempting this activity.
Case Study
The details of freelance trainers and assessors are stored on a database. This is used to pick staff
whose knowledge meets client requirements.
BCTAA develops bespoke training and assessment for vocation skills, such as IT skills, the
maintenance of unusual machinery or working with a unique production process.
Bespoke training requires collaboration with the client and often includes handling
highly confidential information, such as trade secrets.
Full-time Training Managers meet clients and work with them to create and run bespoke
training and assessment.
BCTAA is moving from a business park on the outskirts of Birmingham to larger city
centre premises. The company has taken a lease on the 19th floor of a 20 storey building,
Edexcelsior House (EH).
The building has mixed commercial and office usage. The 18th floor is leased by a recruitment
agency. There is a restaurant and coffee bar on the 20th floor and a café in the
garden on the roof. There are several small retail units on the ground floor. There is a
gym, an art gallery and meeting rooms on other floors. A number of different companies
have office space in the building.
Most of the public areas are open outside of normal office hours. The restaurant and café are
popular in the evening.
The lifts, stairs, toilets (WCs) and the area around them is used by the public. The remaining
area is a private, single open space that can be partitioned to create rooms or workspaces.
The 19th floor has many electrical points. The data outlets have an optical fibre internet
access point. The data outlets are connected by Cat6 cable to a patch panel near the
internet access point. BCTAA will have to setup their own network devices.
The private area of the 19th floor is protected by a card reader door control system.
This uses near field communication/proximity cards, similar to those used for contactless
payment systems. The readers are already in place for each door. The EH management
company supplies cards, a card programming device and logging and control software.
The doors can also be unlocked from the inside by means of a push button.
Your contact is Baljinder Singh, an experienced computer user who is responsible for the
current network. He is not a network specialist and says that the current system “had stuff added
when we thought it was needed.” Baljinder has produced a basic network design and wants you
to review his ideas, and to make sure the new system is secure from the start.
Figure 2.