Please enable JavaScript to use CodeHS

Massachusetts 6-8 Standards Mapping


Fundamentals of Cybersecurity

67 Standards in this Framework 42 Standards Mapped 62% Mapped to Course

Standard Lessons
6-8.CAS.a1 Identify threats and actively protect devices and networks from viruses, intrusion, vandalism, and other malicious activities.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.11 Types of SQLi and Prevention
6-8.CAS.a2 Describe how cyberbullying can be prevented and managed.
  1. 2.2 Cyberbullying
6-8.CAS.a3 Explain the connection between the persistence of data on the Internet, personal online identity, and personal privacy.
  1. 2.4 Privacy & Security
  2. 8.3 The Value of Data
  3. 8.4 Databases
6-8.CAS.a4 Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).
  1. 2.1 Digital Footprint and Reputation
6-8.CAS.a5 Differentiate between appropriate and inappropriate content on the Internet.
  1. 2.5 Information Literacy
6-8.CAS.b1 Explain how copyright law and licensing protect the owner of intellectual property.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
6-8.CAS.b2 Explain possible consequences of violating intellectual property law and plagiarism.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
6-8.CAS.b3 Apply fair use for using copyrighted materials (e.g., images, music, video, text).
  1. 2.6 Creative Credit & Copyright
6-8.CAS.b4 Identify the legal consequences of sending or receiving inappropriate content (e.g., cyberbullying, harassment, sexting).
  1. 2.2 Cyberbullying
6-8.CAS.b5 Differentiate among open source and proprietary software licenses and their applicability to different types of software and media.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
6-8.CAS.b6 Demonstrate compliance with the school’s Acceptable Use Policy (AUP).
  1. 2.6 Creative Credit & Copyright
6-8.CAS.b7 Identify software license agreements and application permissions.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
  3. 7.6 Application Security
6-8.CAS.b8 Explain positive and malicious purposes of hacking.
  1. 2.7 Hacking Ethics
6-8.CAS.b9 License original content and extend license for sharing in the public domain (e.g., creative commons).
6-8.CAS.c1 Describe current events and emerging technologies in computing and the effects they may have on education, the workplace, individuals, communities, and global society.
  1. 10.10 Impact of the Internet
6-8.CAS.c2 Identify and discuss the technology proficiencies needed in the classroom and the workplace, and how to meet the needs.
6-8.CAS.c3 Relate the distribution of computing resources in a global society to issues of equity, access, and power.
  1. 10.10 Impact of the Internet
6-8.CAS.c4 Evaluate how media and technology can be used to distort, exaggerate, and misrepresent information.
6-8.CAS.c5 Evaluate the bias of digital information sources, including websites.
  1. 10.10 Impact of the Internet
6-8.DTC.a1 Identify and explain the strengths, weaknesses, and capabilities of a variety of digital tools.
6-8.DTC.a2 Identify the kinds of content associated with different file types and why different file types exist (e.g., formats for word processing, images, music, three-dimensional drawings.).
  1. 7.3 Compatibility
6-8.DTC.a3 Integrate information from multiple file formats into a single artifact.
6-8.DTC.a4 Individually and collaboratively, use advanced tools to design and create online content (e.g., digital portfolio, multimedia, blog, webpage).
  1. 3.1 Project: Public Service Announcement
  2. 19.15 Your First Website
6-8.DTC.a5 Individually and collaboratively, develop and conduct an online survey.
6-8.DTC.b1 Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources.
  1. 3.1 Project: Public Service Announcement
  2. 9.1 Project: Security Assessment Report
6-8.DTC.b2 Collaborate synchronously and asynchronously through online digital tools.
6-8.DTC.b3 Demonstrate ability to communicate appropriately through various online tools (e.g., e-mail, social media, texting, blog comments).
6-8.DTC.c1 Perform advanced searches to locate information using a variety of digital sources (e.g., Boolean Operators, limiters like reading level, subject, media type).
  1. 2.5 Information Literacy
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
6-8.DTC.c2 Evaluate quality of digital sources for reliability, including currency, relevancy, authority, accuracy, and purpose of digital information.
  1. 2.5 Information Literacy
6-8.DTC.c3 Gather, organize, and analyze information from digital sources by quoting, paraphrasing, and/or summarizing.
6-8.DTC.c4 Create an artifact, individually and collaboratively, that answers a research question and communicates results and conclusions.
6-8.DTC.c5 Use digital citation tools to cite sources using a school- or district-adopted format [e.g., Modern Language Association (MLA)], including proper citation for all text and non-text sources (e.g., images, audio, video).
  1. 2.6 Creative Credit & Copyright
6-8.CS.a1 Describe the main functions of an operating system.
  1. 7.1 Operating Systems
6-8.CS.a2 Recognize that there is a wide range of application software.
  1. 7.4 Software and Applications
6-8.CS.a3 Identify and describe the function of the main internal parts of a basic computing device [e.g., motherboard, hard drive, Central Processing Unit (CPU)].
  1. 11.1 Internal Components
6-8.CS.a4 Identify and describe the use of sensors, actuators, and control systems in an embodied system (e.g., a robot, an e-textile, installation art, smart room).
6-8.CS.a5 Individually and collaboratively design and demonstrate the use of a device (e.g., robot, etextile) to accomplish a task.
6-8.CS.a6 Use a variety of computing devices [e.g., probes, sensors, handheld devices, Global Positioning System (GPS)] to individually and collaboratively collect, analyze, and present information for content-related problems.
6-8.CS.a7 Identify steps involved in diagnosing and solving routine hardware and software problems (e.g., power, connections, application window or toolbar, cables, ports, network resources, video, sound) that occur during everyday computer use.
  1. 12.1 Methodology
  2. 12.2 Support Practice
6-8.CS.b1 Explain why some problems can be solved more easily by computers or humans based on a general understanding of types of tasks at which each excels.
6-8.CS.b2 Describe how humans and machines interact to solve problems that cannot be solved by either alone (e.g., “big data” experiments that involve drawing conclusions by analyzing vast amounts of data).
  1. 8.3 The Value of Data
6-8.CS.c1 Explain the difference between physical (wired), local and wide area, wireless, and mobile networks.
  1. 10.4 Internet Hardware and Sending Information
  2. 11.3 Network Devices
6-8.CS.c2 Model the components of a network, including devices, routers, switches, cables, wires, and transponders.
  1. 10.7 Routing
  2. 11.3 Network Devices
6-8.CS.c3 Describe how information, both text and non-text, is translated and communicated between digital devices over a computer network.
  1. 10.1 Introduction to the Internet
  2. 10.8 Packets & Protocols
  3. 10.9 Viewing a Webpage
6-8.CS.d1 Identify capabilities of devices that are enabled through services (e.g., a wearable device that stores fitness data in the cloud, a mobile device that uses location services for navigation).
6-8.CT.a1 Describe how data is abstracted by listing attributes of everyday items to represent, order and compare those items (e.g., street address as an abstraction for locations; car make, model, and license plate number as an abstraction for cars).
  1. 10.1 Introduction to the Internet
6-8.CT.a2 Define a simple function that represents a more complex task/problem and can be reused to solve similar tasks/problems.
  1. 4.2 Programming with Karel
6-8.CT.a3 Use decomposition to define and apply a hierarchical classification scheme to a complex system, such as the human body, animal classification, or in computing.
6-8.CT.b1 Design solutions that use repetition and conditionals.
  1. 4.4 Branching
  2. 22.1 Booleans
  3. 22.5 For Loops in JavaScript
  4. 22.9 While Loops
  5. 22.10 Loop and a Half
6-8.CT.b2 Use logical reasoning to predict outputs given varying inputs.
  1. 4.3 Looping
  2. 22.2 Logical Operators
  3. 22.10 Loop and a Half
6-8.CT.b3 Individually and collaboratively, decompose a problem and create a sub-solution for each of its parts (e.g., video game, robot obstacle course, making dinner).
6-8.CT.b4 Recognize that more than one algorithm can solve a given problem.
  1. 21.1 Challenge Problems
6-8.CT.b5 Recognize that boundaries need to be taken into account for an algorithm to produce correct results.
6-8.CT.c1 Demonstrate that numbers can be represented in different base systems (e.g., binary, octal, and hexadecimal) and text can be represented in different ways [e.g., American Standard Code for Information Interchange (ASCII)].
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
6-8.CT.c2 Describe how computers store, manipulate, and transfer data types and files (e.g., integers, real numbers, Boolean Operators) in a binary system.
  1. 10.2 Notational Systems
6-8.CT.c3 Create, modify, and use a database (e.g., define field formats, add new records, manipulate data), individually and collaboratively, to analyze data and propose solutions for a task/problem.
  1. 8.4 Databases
  2. 8.6 What is SQL?
  3. 8.7 Basic Querying in SQL
  4. 8.8 Filtering Queries in SQL
  5. 18.2 Ordering Results
  6. 18.3 Renaming Fields
  7. 18.4 Joining Tables
  8. 18.5 More Joining Tables
6-8.CT.c4 Perform a variety of operations such as sorting, filtering, and searching in a database to organize and display information in a variety of ways such as number formats (scientific notation and percentages), charts, tables, and graphs.
  1. 8.7 Basic Querying in SQL
  2. 8.8 Filtering Queries in SQL
  3. 18.2 Ordering Results
  4. 18.3 Renaming Fields
  5. 18.4 Joining Tables
  6. 18.5 More Joining Tables
6-8.CT.c5 Select and use data-collection technology (e.g., probes, handheld devices, geographic mapping systems) to individually and collaboratively gather, view, organize, analyze, and report results for content-related problems.
6-8.CT.d1 Individually and collaboratively compare algorithms to solve a problem, based on a given criteria (e.g., time, resource, accessibility).
6-8.CT.d2 Use functions to hide the detail in a program.
  1. 4.2 Programming with Karel
6-8.CT.d3 Create a program, individually and collaboratively, that implements an algorithm to achieve a given goal.
  1. 4.3 Looping
  2. 4.4 Branching
6-8.CT.d4 Implement problem solutions using a programming language, including all of the following: looping behavior, conditional statements, expressions, variables, and functions.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.1 Booleans
  4. 22.5 For Loops in JavaScript
6-8.CT.d5 Trace programs step-by-step in order to predict their behavior.
6-8.CT.d6 Use an iterative approach in development and debugging to understand the dimensions of a problem clearly.
6-8.CT.e1 Create a model of a real-world system and explain why some details, features and behaviors were required in the model and why some could be ignored.
6-8.CT.e2 Use and modify simulations to analyze and illustrate a concept in depth (e.g., light rays/mechanical waves interaction with materials, genetic variation).
6-8.CT.e3 Select and use computer simulations, individually and collaboratively, to gather, view, analyze, and report results for content-related problems (e.g., migration, trade, cellular function).