SAQA All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.
SOUTH AFRICAN QUALIFICATIONS AUTHORITY 
REGISTERED UNIT STANDARD: 

Administer security systems for a multi-user computer system 
SAQA US ID UNIT STANDARD TITLE
114069  Administer security systems for a multi-user computer system 
ORIGINATOR
SGB Information Systems and Technology 
PRIMARY OR DELEGATED QUALITY ASSURANCE FUNCTIONARY
-  
FIELD SUBFIELD
Field 10 - Physical, Mathematical, Computer and Life Sciences Information Technology and Computer Sciences 
ABET BAND UNIT STANDARD TYPE PRE-2009 NQF LEVEL NQF LEVEL CREDITS
Undefined  Regular  Level 6  Level TBA: Pre-2009 was L6  15 
REGISTRATION STATUS REGISTRATION START DATE REGISTRATION END DATE SAQA DECISION NUMBER
Reregistered  2018-07-01  2023-06-30  SAQA 06120/18 
LAST DATE FOR ENROLMENT LAST DATE FOR ACHIEVEMENT
2024-06-30   2027-06-30  

In all of the tables in this document, both the pre-2009 NQF Level and the NQF Level is shown. In the text (purpose statements, qualification rules, etc), any references to NQF Levels are to the pre-2009 levels unless specifically stated otherwise.  

This unit standard does not replace any other unit standard and is not replaced by any other unit standard. 

PURPOSE OF THE UNIT STANDARD 
This standard is intended for people in who are required to administer security systems for multi-user computer systems:
  • As fundamental knowledge of the areas covered.
  • For those working in, or entering the Information Technology industry in the area of Information Technology Services.
  • As additional knowledge for those wanting to understand the areas covered.

    People credited with this unit standard are able to:
  • Understand the organisation`s security policy.
  • Manage security of desktop computers connected to the system.
  • Maintain security systems for a multi-user computer system.
  • Manage security systems for a multi-user computer system.
  • Review security systems for a multi-user computer system.
  • Provide technical support for the use of security systems for a multi-user computer system.
    The performance of all outcomes is to a standard that is expected in a professional environment. 

  • LEARNING ASSUMED TO BE IN PLACE AND RECOGNITION OF PRIOR LEARNING 
    The credit value of this unit standard is calculated assuming a person has the prior knowledge and skills to:
  • Demonstrate an understanding of security systems for multi-user computers. 

  • UNIT STANDARD RANGE 
  • "Multi-user systems" refers to mid-range, mainframe, or network fileserver based systems.
  • "Security systems" includes the physical system, that is the mid-range, mainframe and/or network fileserver and connected desktop and other computers as well as the related software. 

  • Specific Outcomes and Assessment Criteria: 

    SPECIFIC OUTCOME 1 
    Understand the organisation`s Security Policy. 

    ASSESSMENT CRITERIA
     

    ASSESSMENT CRITERION 1 
    1. Organisation`s Security Policy is located. 

    ASSESSMENT CRITERION 2 
    2. The organisation`s Security Policy is read and questions relating to issues that are unclear are addressed. 

    SPECIFIC OUTCOME 2 
    Manage security of desktop computers connected to the system. 

    ASSESSMENT CRITERIA
     

    ASSESSMENT CRITERION 1 
    1. Desktop computers are scanned for viruses. 

    ASSESSMENT CRITERION 2 
    2. Viruses found are recorded and removed according to company`s standards, procedures and Security Policy. 

    ASSESSMENT CRITERION 3 
    3. Desktop computers are monitored for illegal software. 

    ASSESSMENT CRITERION 4 
    4. Incidences of illegal software are recorded. 

    ASSESSMENT CRITERION 5 
    5. Recording of viruses and illegal software are reported according to company`s standards and procedures. 

    SPECIFIC OUTCOME 3 
    Maintain security systems for a multi-user computer system. 
    OUTCOME RANGE 
    File security, access security, resource security, encryption facilities, etc. 

    ASSESSMENT CRITERIA
     

    ASSESSMENT CRITERION 1 
    1. Back-ups are determined and stored according to organisational guidelines. 

    ASSESSMENT CRITERION 2 
    2. Back-ups are restored according to organisation`s standards, procedures and Security Policy. 

    ASSESSMENT CRITERION 3 
    3. Configuration changes are made to the security systems according to organisation requirements. 
    ASSESSMENT CRITERION RANGE 
    Reasons for changes may include but are not limited to: staff changes, resource changes, software changes.
     

    ASSESSMENT CRITERION 4 
    4. Changes to the security systems are authorised and implemented according to organisation standards, procedures and Security Policy. 

    ASSESSMENT CRITERION 5 
    5. Changes to the security systems maintain the integrity and security of the system. 

    SPECIFIC OUTCOME 4 
    Manage security systems for a multi-user computer system. 

    ASSESSMENT CRITERIA
     

    ASSESSMENT CRITERION 1 
    1. Internal and external resources are used to identify and update security gaps. 

    ASSESSMENT CRITERION 2 
    2. Security exposures and violations are identified, and action is taken according to organisation requirements and Security Policy. 

    ASSESSMENT CRITERION 3 
    3. Access is provided according to organisation requirements and Security Policy. 

    ASSESSMENT CRITERION 4 
    4. Monitoring and tuning of the security system ensures the operation and performance meets the manufacturer`s and organisation specifications. 

    ASSESSMENT CRITERION 5 
    5. Monitoring and tuning of the security system ensures the operation and performance are in line with Security Policy. 

    SPECIFIC OUTCOME 5 
    Review security systems for a multi-user computer system. 

    ASSESSMENT CRITERIA
     

    ASSESSMENT CRITERION 1 
    1. Security needs of the organisation are reviewed. 

    ASSESSMENT CRITERION 2 
    2. Software is used to evaluate and report on the security in place in the systems. 

    ASSESSMENT CRITERION 3 
    3. In-built security and access features of the systems operating system are reviewed. 

    ASSESSMENT CRITERION 4 
    4. The file security categorisation scheme is reviewed. 

    ASSESSMENT CRITERION 5 
    5. Control methods used on the system are reviewed. 
    ASSESSMENT CRITERION RANGE 
    Input, output, file, processing, etc.
     

    ASSESSMENT CRITERION 6 
    6. Module and system-wide controls are reviewed. 
    ASSESSMENT CRITERION RANGE 
    Date/version checks, reconciliation procedures, etc.
     

    ASSESSMENT CRITERION 7 
    7. The review procedure meets organisation standards and procedures. 

    ASSESSMENT CRITERION 8 
    8. The review recommends improvements that need to be made to the security system. 

    SPECIFIC OUTCOME 6 
    Provide technical support for the use of security systems for a multi-user computer system. 

    ASSESSMENT CRITERIA
     

    ASSESSMENT CRITERION 1 
    1. User problems relating to the security system are identified and resolved following organisation procedures. 

    ASSESSMENT CRITERION 2 
    2. Advice on the use of a security system is provided according to organisation requirements. 


    UNIT STANDARD ACCREDITATION AND MODERATION OPTIONS 
    The relevant Education and Training Quality Authority (ETQA) must accredit providers before they can offer programmes of education and training assessed against unit standards.

    Moderation Process:
    Moderation of assessment will be overseen by the relevant ETQA according to the moderation guidelines in the relevant qualification and the agreed ETQA procedures. 

    UNIT STANDARD ESSENTIAL EMBEDDED KNOWLEDGE 
  • Proficient in Corporate, Industry and Professional Standards. Standards associated with the practitioner`s current Role. E.g. safety standards, departmental programming standards, organisational network performance standards, help desk procedures, corporate quality and change management processes, IT Infrastructure Library.
  • Proficient in Access Control Systems. Any tool or system which provides access security control (i.e prevents unauthorised access to systems). E.g. ACF2.
  • Familiar with Application Systems. The application of automated systems to the support of specific business functions or processes. E.g. enterprise resource planning, sales forecasting, airline reservations, petroleum reservoir modeling.
  • Familiar with Operating Infrastructure. Knowledge of the ICT infrastructure (hardware, databases, operating systems, local area networks etc) used within own organisation.
  • Familiar with Business Continuity Planning. Methods and techniques for risk management, business impact analysis, countermeasures and contingency arrangements relating to the serious disruption of ICT services. E.g. fallback location/services, mobile back-up, diversity.
  • Familiar with Information Capture Techniques. The selection and application of information gathering methods, tools and techniques which are appropriate to the information required and the sources available. E.g. contextual enquiries, focus groups, structured interviews, questionnaires, observation, statistical analysis.
  • Familiar with Legislation. Relevant national and international legislation. E.g. Data Protection, Privacy, Intellectual Property. 

  • UNIT STANDARD DEVELOPMENTAL OUTCOME 
    N/A 

    UNIT STANDARD LINKAGES 
    N/A 


    Critical Cross-field Outcomes (CCFO): 

    UNIT STANDARD CCFO IDENTIFYING 
    Identifies and solves problems by planning and organisation in determining a course of action by breaking it down into smaller steps and by planning and resourcing each of these, making allowance for potential problems. 

    UNIT STANDARD CCFO WORKING 
    Works effectively with others by working co-operatively to achieve a security goals. 

    UNIT STANDARD CCFO ORGANISING 
    Organise and manage oneself by taking initiative and being proactive, taking action and anticipating opportunities. 

    UNIT STANDARD CCFO CONTRIBUTING 
    Understands the world as a set of related systems by having cross-functional and inter-disciplinary awareness and an understanding the needs, objectives and constraints of those in other disciplines and functions. 

    UNIT STANDARD ASSESSOR CRITERIA 
    N/A 

    REREGISTRATION HISTORY 
    As per the SAQA Board decision/s at that time, this unit standard was Reregistered in 2012; 2015. 

    UNIT STANDARD NOTES 
    1. Performance of all outcomes is to be carried out in accordance with organisation standards and procedures, unless otherwise stated. Organisation standards and procedures may cover: quality assurance, documentation, security, communication, health and safety, and personal behaviour. An example of the standards expected is the standards found in ISO 9000 Certified Organisations.

    2. Performance of all outcomes is to be completed within the normal range of time that would be expected in a professional environment, e.g. in a commercial or government organisation.

    3. Performance of all outcomes is to be within the normal range of cost, or cost estimate, that would be expected in a commercial environment.

    4. Performance of all outcomes complies with the laws of South Africa, especially with regard to copyright, privacy, health and safety, and consumer rights.

    Domain:
    Computer Operations - IT Services. 

    QUALIFICATIONS UTILISING THIS UNIT STANDARD: 
      ID QUALIFICATION TITLE PRE-2009 NQF LEVEL NQF LEVEL STATUS END DATE PRIMARY OR DELEGATED QA FUNCTIONARY
    Elective  48573   National Certificate: Information Technology: Systems Support  Level 5  Level TBA: Pre-2009 was L5  Reregistered  2023-06-30  MICTS 
    Elective  49121   National Certificate: Interactive Media  Level 5  Level TBA: Pre-2009 was L5  Reregistered  2023-06-30  MICTS 
    Elective  66109   National Diploma: Aircraft Performance Engineering  Level 6  NQF Level 06  Passed the End Date -
    Status was "Reregistered" 
    2016-12-31  TETA 


    PROVIDERS CURRENTLY ACCREDITED TO OFFER THIS UNIT STANDARD: 
    This information shows the current accreditations (i.e. those not past their accreditation end dates), and is the most complete record available to SAQA as of today. Some Primary or Delegated Quality Assurance Functionaries have a lag in their recording systems for provider accreditation, in turn leading to a lag in notifying SAQA of all the providers that they have accredited to offer qualifications and unit standards, as well as any extensions to accreditation end dates. The relevant Primary or Delegated Quality Assurance Functionary should be notified if a record appears to be missing from here.
     
    1. 2KO AFRICA 
    2. Academy of Training and Development 
    3. All Connections cc 
    4. Arise Business Centre 
    5. Artshub Institute (Pty) Ltd 
    6. ATTI IT SOLUTIONS BLOEMFONTEIN 
    7. ATTI Nelspruit Pty Ltd 
    8. Boston Technology Campus (Pty) Ltd 
    9. Broadband College of Technology 
    10. Bytes People Solutions A Division of Altron TMT (Pty) Ltd 
    11. Careers IT (Pty) Ltd 
    12. Critical Skills Training (Pty) Ltd 
    13. Damelin Correspondence College (Pty) Ltd 
    14. Delcom Training Institute 
    15. Delight Computer Training 
    16. Denwin's Computer & Business School 
    17. EAST LONDON MANAGEMENT INSTITUTE 
    18. Ekasi IT Solutions CC 
    19. EOH Abantu (Pty) Ltd 
    20. Fakazani Management Services 
    21. Falcon Business Institute (Pty) Ltd 
    22. False Bay College 
    23. Global Softech Skills Academy 
    24. Go Computer Cash and Carry 
    25. Henpro Solutions College 
    26. IALE School of Advanced Learning and Education (Pty) Ltd 
    27. Imbalenhle Learning Academy 
    28. In Excess Trading 22 T/A ATTI Polokwane 
    29. Intec College 
    30. iSolve Business Solutions (Pty) Ltd 
    31. IT Certification Academy 
    32. IT SA Computer Services Solutions (Pty) Ltd 
    33. Jeppe College of Commerce and Computer Studies 
    34. Jonda Learning Academy 
    35. Kaelo Computer Training cc 
    36. Kezla Investments 
    37. Konani Training and Development Institute 
    38. Madzahisi College 
    39. Mass Computer Training And Printers 
    40. NET2G Technologies (Pty) Ltd t/a IT SCHOOL 
    41. NetCampus (Pty) Ltd. 
    42. Nextgen Training Solutions (Pty) Ltd 
    43. Ngubeni Corporation 
    44. On the Ball College Pty ltd 
    45. Phokophela Investment Holdings (Pty) Ltd 
    46. Qhakaza Management Services 
    47. Quantum Career Development (PTY) LTD 
    48. Richfield Graduate Institute of Technology Pty Ltd 
    49. SEBATA Institute of Consulting and Development 
    50. Technology Corporate Management (Pty) Ltd 
    51. The Graduate Institute of South Africa 
    52. Titan Trade Technologies (Pty) Ltd 
    53. Torque Technical Computer Training (Pty) Ltd 
    54. Umzinyathi Telecommunications (Pty) Ltd 
    55. Whitestone College 
    56. Work Skills Resources 
    57. Xtensive ICT Academy (Pty) Ltd 
    58. Xylo Trading 12 (Pty) Ltd 



    All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is illegal to sell this material for profit. If the material is reproduced or quoted, the South African Qualifications Authority (SAQA) should be acknowledged as the source.