for Delaware 3B — Fundamentals of Cybersecurity (2020)
Total Standards: 28Mapped: 18Completion: 64%
3B-AP-08
Describe how artificial intelligence drives many software and physical systems.
3B-AP-09
Implement an artificial intelligence algorithm to play a game against a human opponent or solve a problem.
3B-AP-10
Use and adapt classic algorithms to solve computational problems.
5.3 Basic Crypto Systems: Caesar Cipher
5.3 Basic Crypto Systems: Caesar Cipher
5.5 Basic Crypto Systems: Vigenere Cipher
5.5 Basic Crypto Systems: Vigenere Cipher
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
3B-AP-11
Evaluate algorithms in terms of their efficiency, correctness, and clarity.
5.4 Basic Crypto Systems: Cracking Caesar
5.4 Basic Crypto Systems: Cracking Caesar
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
3B-AP-12
Compare and contrast fundamental data structures and their uses.
4.5 Arrays and Objects
4.5 Arrays and Objects
22.2 Logical Operators
22.2 Logical Operators
22.3 Comparison Operators
22.3 Comparison Operators
22.4 If Statements
22.4 If Statements
22.5 For Loops in JavaScript
22.5 For Loops in JavaScript
22.6 General For Loops
22.6 General For Loops
22.7 For Loop Practice
22.7 For Loop Practice
22.8 Random Numbers
22.8 Random Numbers
22.9 While Loops
22.9 While Loops
22.10 Loop and a Half
22.10 Loop and a Half
3B-AP-13
Illustrate the flow of execution of a recursive algorithm.
3B-AP-14
Construct solutions to problems using student-created components, such as procedures, modules and/or objects.
5.3 Basic Crypto Systems: Caesar Cipher
5.3 Basic Crypto Systems: Caesar Cipher
5.5 Basic Crypto Systems: Vigenere Cipher
5.5 Basic Crypto Systems: Vigenere Cipher
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
21.1 Challenge Problems
21.1 Challenge Problems
3B-AP-15
Analyze a large-scale computational problem and identify generalizable patterns that can be applied to a solution.
3B-AP-16
Demonstrate code reuse by creating programming solutions using libraries and APIs.
21.1 Challenge Problems
21.1 Challenge Problems
22.1 Booleans
22.1 Booleans
22.2 Logical Operators
22.2 Logical Operators
22.3 Comparison Operators
22.3 Comparison Operators
22.4 If Statements
22.4 If Statements
22.5 For Loops in JavaScript
22.5 For Loops in JavaScript
22.6 General For Loops
22.6 General For Loops
22.7 For Loop Practice
22.7 For Loop Practice
22.8 Random Numbers
22.8 Random Numbers
22.9 While Loops
22.9 While Loops
22.10 Loop and a Half
22.10 Loop and a Half
3B-AP-17
Plan and develop programs for broad audiences using a software life cycle process.
3B-AP-18
Explain security issues that might lead to compromised computer programs.
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.10 SQL Injection Overview
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
3B-AP-19
Develop programs for multiple computing platforms.
3B-AP-20
Use version control systems, integrated development environments (IDEs), and collaborative tools and practices (code documentation) in a group software project.
3B-AP-21
Develop and use a series of test cases to verify that a program performs according to its design specifications.
3B-AP-22
Modify an existing program to add additional functionality and discuss intended and unintended implications (e.g., breaking other functionality).
5.3 Basic Crypto Systems: Caesar Cipher
5.5 Basic Crypto Systems: Vigenere Cipher
6.1 Project: Classic Cipher Newscast
3B-AP-23
Evaluate key qualities of a program through a process such as a code review.
3B-AP-24
Compare multiple programming languages and discuss how their features make them suitable for solving different types of problems.
4.1 Programming Concepts
3B-CS-01
Categorize the roles of operating system software.
7.1 Operating Systems
7.1 Operating Systems
7.2 Comparing Operating Systems
7.2 Comparing Operating Systems
7.3 Compatibility
7.3 Compatibility
3B-CS-02
Illustrate ways computing systems implement logic, input, and output through hardware components.
9.2 Notational Systems
9.4 Internet Hardware and Sending Information
9.4 Internet Hardware and Sending Information
9.7 Routing
9.7 Routing
10.1 Internal Components
3B-DA-05
Use data analysis tools and techniques to identify patterns in data representing complex systems.
8.3 The Value of Data
3B-DA-06
Select data collection tools and techniques to generate data sets that support a claim or communicate information.
8.7 Basic Querying in SQL
8.7 Basic Querying in SQL
8.8 Filtering Queries in SQL
8.8 Filtering Queries in SQL
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
3B-DA-07
Evaluate the ability of models and simulations to test and support the refinement of hypotheses.
3B-IC-25
Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
9.10 Impact of the Internet
9.10 Impact of the Internet
3B-IC-26
Evaluate the impact of equity, access, and influence on the distribution of computing resources in a global society.
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.3 Internet Safety
2.3 Internet Safety
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
9.1 Introduction to the Internet
9.10 Impact of the Internet
9.10 Impact of the Internet
3B-IC-27
Predict how computational innovations that have revolutionized aspects of our culture might evolve.
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
9.1 Introduction to the Internet
9.1 Introduction to the Internet
9.10 Impact of the Internet
9.10 Impact of the Internet
3B-IC-28
Debate laws and regulations that impact the development and use of software.
2.2 Cyberbullying
2.2 Cyberbullying
2.4 Privacy & Security
2.4 Privacy & Security
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
7.5 Software Licenses
9.9 Viewing a Webpage
9.9 Viewing a Webpage
9.10 Impact of the Internet
9.10 Impact of the Internet
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
3B-NI-03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
9.4 Internet Hardware and Sending Information
9.4 Internet Hardware and Sending Information
10.3 Network Devices
10.5 Network Options
10.5 Network Options
10.6 Network Communication
3B-NI-04
Compare ways software developers protect devices and information from unauthorized access.