Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computer Science 3: Cybersecurity

13

Standards in this Framework

13

Standards Mapped

100%

Mapped to Course

Standard Lessons
CS3S-1.1
Describe and discuss key concepts in security, including confidentiality, integrity and availability, authentication, and access control.
  1. 1.4 The CIA Triad
  2. 6.8 System Administration
CS3S-1.2
Describe and discuss key concepts in cybersecurity, including cryptology, cryptography, cryptanalysis, cipher, cryptographic algorithm, private and public key encryption, public key infrastructure, and trust/trustworthiness.
  1. 2.1 Cryptography, Cryptology, Cryptanalysis
  2. 2.2 History of Cryptography
  3. 2.3 Basic Crypto Systems: Caesar Cipher
  4. 2.4 Basic Crypto Systems: Cracking Caesar
  5. 2.5 Basic Crypto Systems: Vigenere Cipher
  6. 4.2 Encryption Algorithms
  7. 4.3 Advanced Cryptography
  8. 4.4 Hash Functions
  9. 4.6 Asymmetric Encryption
CS3S-1.3
Discuss the basic concepts of probability, random variables and probability distributions as they apply to information theory and cryptography.
  1. 4.4 Hash Functions
  2. 4.6 Asymmetric Encryption
CS3S-2.1
Demonstrate the techniques to transform plaintext into ciphertext, the use of hash functions for authentication and data integrity, and the use of private and public key encryption.
  1. 4.2 Encryption Algorithms
  2. 4.3 Advanced Cryptography
  3. 4.4 Hash Functions
  4. 4.5 Hash Function Development
  5. 4.6 Asymmetric Encryption
CS3S-2.2
Investigate security vulnerabilities in various data structures, such as out-of-bounds arrays and buffer overflows.
  1. 9.10 SQL Injection Overview
  2. 9.11 Types of SQLi and Prevention
  3. 10.1 Project: Security Assessment Report
  4. 12.2 Assessing Risks
CS3S-3.1
Discuss various types of cyberattacks on software and software systems along with possible countermeasures and security controls that minimize risk and exposure
  1. 1.3 Impact of Cybersecurity
  2. 6.6 Application Security
  3. 6.8 System Administration
  4. 9.9 Common Security Problems
  5. 12.2 Assessing Risks
CS3S-3.2
Discuss current industry standards, tools, and security practices in software development, including use of multiple layers of defenses, wireless security, and risks in 3rd party applications and libraries.
  1. 6.6 Application Security
  2. 7.3 Network Devices
  3. 7.5 Network Options
  4. 9.11 Types of SQLi and Prevention
CS3S-4.1
Explain the tradeoffs of developing a program in a typesafe language Implement secure coding and testing techniques including input validation, data sanitization, and exception handling.
  1. 9.11 Types of SQLi and Prevention
  2. 12.2 Assessing Risks
CS3S-4.2
Describe when and how to properly use open source vs. closed source software.
  1. 6.4 Software and Applications
  2. 6.5 Software Licenses
  3. 11.4 Level 4: Data and Licenses
CS3S-4.3
Examine the need to update software to fix security vulnerabilities.
  1. 6.4 Software and Applications
  2. 6.6 Application Security
  3. 12.2 Assessing Risks
CS3S-5.1
Discuss the role of software security in a company-wide security policy.
  1. 6.6 Application Security
  2. 11.2 Level 2: User Training
  3. 11.3 Level 3: Incident Response
CS3S-5.2
Develop Secure Software Development Lifecycle.
  1. 11.2 Level 2: User Training
  2. 11.3 Level 3: Incident Response
  3. 11.4 Level 4: Data and Licenses
  4. 11.5 Level 5: Change Management
CS3S-5.3
Perform software security audit on a peer-reviewed project.
  1. 6.6 Application Security