Please enable JavaScript to use CodeHS

Standards Framework

for FL Computer and Network Security Fundamentals


Standards in this Framework

Standard Description
19.01 Define cybersecurity.
19.02 Describe how information security evolved into cybersecurity and the impact of the Internet on the pace and nature of the evolution.
19.03 Describe the individual elements that comprise the CIA triad (i.e., Confidentiality, Integrity, Availability).
19.04 Define and explain the various types of hackers and the role each plays in cybersecurity.
19.05 Describe various methodologies used by hackers and the basis for their employment.
19.06 Describe the individual elements of the AAA model (Authentication, Authorization and Accounting).
20.01 Describe the role of the National Security Agency.
20.02 Describe current trends in cyberattacks and strategies for combating them.
20.03 Describe the legal implications of computer hacking and other forms of cyberattacks.
20.04 Understand the importance of the weekly bulletins distributed by the United States Computer Emergency Readiness Team (US-CERT).
20.05 Determine if any software or hardware on a given network has vulnerabilities outlined in the most recent US-CERT bulletin.
21.01 Differentiate between cybersecurity and information assurance.
21.02 Define confidentiality and give examples of security breaches.
21.03 Define integrity and give examples of security breaches.
21.04 Define authenticity and give examples of security breaches.
21.05 Define accountability (non-repudiation) and give examples of security breaches.
22.01 Describe the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling).
22.02 Demonstrate and understanding of common computer and programming terminology.
22.03 Explain the physical and logical architecture of a microcomputer system.
22.04 Describe the file types used in the operation of a computer.
22.05 Compare and contrast memory technologies (e.g., RAM, ROM, virtual memory, memory management).
23.01 Compare operating system file naming conventions.
23.02 Describe the common elements that comprise the architecture of an operating system (e.g., kernel, file manager, memory manager, device manager, network manager).
23.03 Demonstrate proficiency with file management and structure (e.g., folder creation, file creation, backup, copy, delete, open, save).
23.04 Demonstrate a working knowledge of standard file formats.
23.05 Describe the purpose of various operating systems (e.g., Windows, Mac, iOS, Android and Linux).
23.06 Describe the difference between client and network operating systems.
23.07 Differentiate between different operating systems and applications and Macros.
23.08 Explain the basics of boot sequences, methods and startup utilities.
23.09 Compare and contrast open source and proprietary software.
23.10 Describe common system utilities used in performing computer maintenance.
24.01 Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software.
24.02 Describe the purpose of the OSI model and each of its layers.
24.03 Explain specific functions belonging to each OSI model layer.
24.04 Understand how two network nodes communicate through the OSI model.
24.05 Discuss the structure and purpose of data packets and frames.
24.06 Describe the two types of addressing covered by the OSI model.
25.01 Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software.
25.02 Describe the purpose of the TCP/IP model and each of its layers.
25.03 Explain specific functions belonging to each TCP/IP model layer.
25.04 Understand how two network nodes communicate through the TCP/IP model.
25.05 Describe the two types of addressing covered by the TCP/IP model.
26.01 Describe the services and protocols used in the OSI Application Layer (i.e., DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP).
26.02 Describe the services and protocols used in the OSI Transport Layer (i.e., TCP, TLS/SSL, UDP).
26.03 Describe the services and protocols used in the OSI Network Layer (i.e., IP, ICMP, IGMP, IPsec).
26.04 Describe the services and protocols used in the OSI Data Link Layer (i.e., ARP, OSPF, L2TP, PPP).
27.01 Define networking and describe the purpose of a network.
27.02 Describe the conceptual background of digital networks and cloud computing including terminology and basics.
27.03 Describe various types of networks and the advantages and disadvantages of each (e.g., peer to peer, client/server, server/thin client, ROI).
27.04 Describe the use, advantages, and disadvantages of various network media (e.g. coaxial, twisted pair, fiber optics).
27.05 Describe the function of various network devices (e.g., managed switch, switched hub or switch, router, bridge, gateway, access points, modem).
27.06 Describe how network devices are identified (i.e., IP addressing).
27.07 Explain the protocols commonly used in a network environment.
27.08 Differentiate between public and private IP addresses.
27.09 Describe the common ports and corresponding protocols used in a network.
27.10 Describe the difference between the Internet and intranet.
27.11 Compare and contrast IPv4 and IPv6.
27.12 Compare and contrast the different methods for network connectivity (e.g., broadband, wireless, Bluetooth, cellular).
27.13 Discuss the differences between Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Virtual Local Area Network (VLAN), and Virtual Private Network (VPN).
28.01 Describe the various types of cloud computing (IaaS, PaaS, SaaS) and modes of delivery (Public, Private, Community, Hybrid).
28.02 Describe practices that aid in protecting the Hybrid cloud model.
28.03 Describe the challenges and solutions associated with securing embedded devices.
29.01 Distinguish between vulnerability and a threat.
29.02 Discuss the different types of attacks (e.g., active, passive).
29.03 Define security policy and explain its role in cybersecurity.
29.04 Describe the basic methods of authentication (e.g., password, biometrics, smart cards. two-factor authentication, multifactor authentication).
29.05 Describe the various forms of encryption methodologies (e.g., symmetric, asymmetric, block cipher, stream cipher).
29.06 Describe hash functions and their role in authentication.
29.07 Describe various method of access control used in computer security (e.g., policies, groups, Access Control List (ACL)).
29.08 Understand the concept of malware (i.e., ransomware, worms, viruses, adware) and how attackers use it to steal sensitive or confidential information.
30.01 Define cybercrime and discuss the challenges facing law enforcement.
30.02 Identify the key legislative acts that impact cybersecurity.
30.03 Describe the Federal criminal code related to computers and give examples of cybercrimes and penalties, particularly those involving inappropriate access.
30.04 Discuss the concept of digital forensics and its place in cybercrime investigations and incident response.
30.05 Distinguish among the Intellectual Property Rights of trademark, patent, and copyright.
30.06 Explain digital rights management and the implications of the Digital Millennium Copyright Act (DMCA).
30.07 Describe the implications of various social media on the safeguarding of personal or sensitive information.
30.08 Describe various safeguards that can be employed to help ensure that sensitive or confidential information is not inadvertently divulged or obtained.
31.01 Define virtual computing.
31.02 Explain the benefits of virtual computing.
31.03 Differentiate between guest and host operating systems.
31.04 Install desktop virtualization software.
31.05 Describe the role of the hypervisor.
31.06 Create and upgrade a virtual machine.
31.07 Optimize the performance of a virtual machine.
31.08 Preserve the state of a virtual machine.
31.09 Clone, move and share virtual machines.
31.10 Use basic (static) and dynamic virtual disks and disk drives.
31.11 Configure a virtual network.
31.12 Connect devices to a virtual machine.
31.13 Enable security settings on a virtual machine.
32.01 Configure 802.1x authentication for a given scenario.
32.02 Connect clients to a VPN.
32.03 Understand Authentication, Authorization and Accounting (AAA) management.
32.04 Differentiate between TACACS+ (Terminal Access Controller Access Control System) and RADIUS.
32.05 Differentiate between Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) protocols as they apply to VPN options.
32.06 Implement the use of SSH (Secure Shell).
32.07 Implement the use of IPsec (Internet Protocol Security).
32.08 Identify vulnerabilities associated with authentication.
32.09 Understand ways to implement VoIP technologies.
32.10 Demonstrate the use and purpose of Kerberos.
33.01 Configure access controls including biometric devices, keypads and security tokens.
33.02 Recognize social engineering attempts.
33.03 Evaluate environmental controls (e.g., EMI shielding, temperature, humidity and fire suppression).
33.04 Develop a method of training users to recognize, report, and avoid social engineering attempts.
33.05 Identify components of physical security, including mantraps, motion detection, alarm systems, locks, video surveillance, and fences/barricades.
33.06 Install a camera for a video surveillance system.
33.07 Configure an alarm system including a keypad and motion detector.
33.08 Recognize vulnerabilities associated with physical security.
33.09 Explain how a mantrap is used as a counter measure against tailgating.
34.01 Configure and maintain software and hardware firewalls.
34.02 Configure and secure routers.
34.03 Apply security settings to switches.
34.04 Configure and secure wireless devices.
34.05 Secure a LAN connected to a DSL/cable modem.
34.06 Configure a RAS (Remote Access Server) for remote connectivity.
34.07 Securely deploy a PBX (Private Branch Exchange).
34.08 Explain the benefits of implementing a VPN (Virtual Private Network).
34.09 Deploy IDS (intrusion detection system) and IPS (intrusion prevention systems).
34.1 Analyze the performance, efficiency and security of the network based on network monitoring and diagnostic software.
34.11 Employ techniques used to lock down workstations.
34.12 Configure and secure servers for a given scenario.
34.13 Understand and assess the security of mobile devices including but not limited to those using the Android, iOS and Windows platforms.
35.01 Explain the security implications of the Internet of Things (IoT) (i.e., understand the efforts to address authentication and updates to IoT devices).
35.02 Explain societal and security challenges associated with robotics.
35.03 Explain security challenges associated with serverless computing.
35.04 Explain societal and security challenges associated with the implementation of 5G.
35.05 Describe and explain the security challenges of Autonomous vehicles (i.e., the significance of vehicular cybersecurity and its relation to: computer vision, artificial intelligence, machine learning and deep learning).
36.01 Understand access control as it applies to MAC (Mandatory Access Control).
36.02 Understand access control as it applies to DAC (Discretionary Access Control).
36.03 Understand access control as it applies to RBAC (Role Based Access Control).
37.01 Understand and identify security concerns with the use of Coaxial Cable.
37.02 The student should be able to identify and understand security concerns for UTP/STP (Unshielded Twisted Pair / Shielded Twisted Pair).
37.03 Identify and understand security concerns fiber optic cable.
37.04 Identify security concerns associated with removable media.
37.05 Address pitfalls associated with tape backups.
37.06 Apply drive encryption to hard drives.
37.07 Secure flash drives.
37.08 Smartcards and secure USB memory.
38.01 Determine Security Zones.
38.02 Point out vulnerabilities on a DMZ (Demilitarized Zone).
38.03 Explain the security benefits of using an intranet.
38.04 Explain the security benefits of using an extranet.
38.05 Secure a VLAN (Virtual Local Area Network).
38.06 Describe the security benefits associated with NAT (Network Address Translation).
38.07 Justify the implementation of tunneling, for security purpose.
39.01 Select and employ appropriate communication concepts and strategies to enhance oral and written communication in the workplace.
39.02 Locate, organize and reference written information from various sources.
39.03 Design, develop and deliver formal and informal presentations using appropriate media to engage and inform diverse audiences.
39.04 Interpret verbal and nonverbal cues/behaviors that enhance communication.
39.05 Apply active listening skills to obtain and clarify information.
39.06 Develop and interpret tables and charts to support written and oral communications.
39.07 Exhibit public relations skills that aid in achieving customer satisfaction.
40.01 Employ critical thinking skills independently and in teams to solve problems and make decisions.
40.02 Employ critical thinking and interpersonal skills to resolve conflicts.
40.03 Identify and document workplace performance goals and monitor progress toward those goals.
40.04 Conduct technical research to gather information necessary for decision-making.
41.01 Use personal information management (PIM) applications to increase workplace efficiency.
41.02 Employ technological tools to expedite workflow including word processing, databases, reports, spreadsheets, multimedia presentations, electronic calendar, contacts, email, and internet applications.
41.03 Employ computer operations applications to access, create, manage, integrate, and store information.
41.04 Employ collaborative/groupware applications to facilitate group work.
42.01 Describe the nature and types of business organizations.
42.02 Explain the effect of key organizational systems on performance and quality.
42.03 List and describe quality control systems and/or practices common to the workplace.
42.04 Explain the impact of the global economy on business organizations.
43.01 Evaluate and justify decisions based on ethical reasoning.
43.02 Evaluate alternative responses to workplace situations based on personal, professional, ethical, legal responsibilities, and employer policies.
43.03 Identify and explain personal and long-term consequences of unethical or illegal behaviors in the workplace.
43.04 Interpret and explain written organizational policies and procedures.
43.05 Display proficiency in using team-oriented collaboration and video teleconferencing software (e.g. Teams, Zoom).