Please enable JavaScript to use CodeHS

Arkansas Cybersecurity Year 3 Framework

Standards

Standard Description
CSCS.Y3.1.1 Leverage adversarial thinking and risk concepts to solve complex cybersecurity problems Lessons
CSCS.Y3.1.2 Explore and demonstrate tactics adversaries use to respond to system defenses to accomplish an objective Lessons
CSCS.Y3.1.3 Explore and utilize level-appropriate collaborative methods used to operate an organization at various scales (e.g., local, regional, national, global) Lessons
CSCS.Y3.1.4 Research and implement forensic investigation and intrusion detection techniques to detect adversarial behavior Lessons
CSCS.Y3.2.7 Demonstrate the use of steganography in a program or a digital file (e.g., audio, document, image, video) Lessons
CSCS.Y3.3.4 Utilize SEIM platforms (e.g., Elastic Stack, Graylog, Splunk) or network traffic analysis tools (e.g., NetworkMiner, Wireshark) and analyze their ability to graphically represent the data they collect Lessons
CSCS.Y3.3.5 Perform level-appropriate data analysis using computing tools Lessons
CSCS.Y3.4.1 Research and describe the origins of Operational Security (OPSEC) programs and the role OPSEC plays in both offensive and defensive security programs Lessons
CSCS.Y3.4.2 Identify and research the various local and regional cybersecurity communities Lessons
CSCS.Y3.4.3 Recommend and implement level-appropriate mitigations to common attacks on hardware, software, and networks Lessons
CSCS.Y3.4.5 Perform and document a level-appropriate cybersecurity assessment against an application or system Lessons
CSCS.Y3.5.1 Design and implement algorithms that solve level-appropriate, student-identified problems Lessons
CSCS.Y3.5.4 Utilize a systematic approach to identify and mitigate common security errors in code (e.g., buffer overflows, cleartext password handling, input validation) Lessons
CSCS.Y3.6.1 Create programs to solve problems of level-appropriate complexity that obtain data from external sources Lessons
CSCS.Y3.6.5 Use a systematic approach to detect logic, runtime, and syntax errors within a program Lessons
CSCS.Y3.6.6 Perform level-appropriate tasks that alter the execution of a program, subvert protections, or otherwise manipulate a file Lessons
CSCS.Y3.8.1 Identify potential mitigation strategies to prevent unnecessary information disclosure about the internal design or architecture of a network Lessons
CSCS.Y3.8.3 Research and describe network security and monitoring devices or concepts including, but not limited to, alerting versus logging, intrusion detection systems (IDS), intrusion prevention systems (IPS), and wireless intrusion detection systems (WIDS) Lessons
CSCS.Y3.8.4 Analyze network traffic for suspicious or malicious activity using a protocol analyzer (e.g., NetworkMiner, Wireshark, Zeek) Lessons
CSCS.Y3.9.1 Create a functionally equivalent program of level-appropriate complexity in two or more programming languages Lessons
CSCS.Y3.9.3 Research and describe tactics utilized by malware to resist removal from a system Lessons
CSCS.Y3.10.1 Identify and construct threat models Lessons
CSCS.Y3.10.2 Research and describe issues related to creating and enforcing cyber-related laws and regulations (e.g., ethical challenges, policy vacuum, privacy versus security, unintended consequences) Lessons
CSCS.Y3.10.4 Identify the ethical implications encountered in the curation, management, and monetization of data (e.g., harvesting, information overload, knowledge management repositories, sharing, summarizing) Lessons
CSCS.Y3.10.7 Create and maintain a professional digital portfolio comprised of self-created work Lessons
CSCS.Y3.11.1 Communicate level-appropriate technical information effectively to diverse audiences including, but not limited to, non-technical audience members Lessons
CSCS.Y3.11.2 Describe and utilize the concepts of storytelling within forensic investigations and incident response Lessons
CSCS.Y3.11.3 Correct for or mitigate common types of bias in technical reports Lessons
CSCS.Y3.11.4 Correct for misinterpretations between causation and correlation Lessons
CSCS.Y3.11.5 Interpret data, from the perspective of a business risk assessment or cybersecurity assessment, to draw inferences and implications about system security Lessons