Please enable JavaScript to use CodeHS

Ohio 7 Standards Mapping


Fundamentals of Cybersecurity

31 Standards in this Framework 22 Standards Mapped 70% Mapped to Course

Standard Lessons
CS.D.7.a Develop and implement a process to evaluate existing computing devices capabilities based on personal interaction with the device.
CS.HS.7.a Evaluate hardware and software combinations used to accomplish a task.
  1. 7.1 Operating Systems
  2. 10.9 Viewing a Webpage
  3. 11.1 Internal Components
  4. 11.2 Peripheral Devices
CS.T.7.a Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
  1. 12.1 Methodology
  2. 12.2 Support Practice
NI.N.7.a Explain the role of hardware components and diagram the infrastructure of networks and the internet (including cloud servers).
  1. 8.5 Clients and Servers
  2. 10.4 Internet Hardware and Sending Information
  3. 11.3 Network Devices
  4. 11.4 Storage Options
NI.N.7.b Explain the protocols (i.e., rules) and why they are used to transmit data across networks and the internet.
  1. 10.8 Packets & Protocols
NI.C.7.a Identify and apply introductory methods of encryption to model the secure transmission of information.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.3 Basic Crypto Systems: Caesar Cipher
NI.C.7.b Describe the types of malware to show how malware affects information.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.4 Privacy & Security
  4. 7.6 Application Security
  5. 8.9 Common Security Problems
NI.C.7.c Identify cybersecurity concerns and measures needed to protect electronic information.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 1.4 The CIA Triad
  4. 2.4 Privacy & Security
  5. 5.1 Cryptography, Cryptology, Cryptanalysis
  6. 7.6 Application Security
  7. 7.7 Browser Configuration
  8. 7.8 System Administration
  9. 8.9 Common Security Problems
  10. 8.10 SQL Injection Overview
  11. 8.11 Types of SQLi and Prevention
  12. 11.6 Network Communication
  13. 11.7 Network Management
DA.DCS.7.a Compare and contrast digital data collection tools to make them more useful and reliable.
DA.DCS.7.b Evaluate various file formats to understand data storage capabilities.
DA.DCS.7.c Create a logical file structure to organize data to support individual and collaborative work.
DA.VC.7.a Communicate relations between data sets to interpret results.
DA.VC.7.b Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.7.a Create and analyze models and simulations to accurately hypothesize a real-world situation.
ATP.A.7.a Select and modify pseudocode for a multi-step process to solve a problem.
ATP.VDR.7.a Use test cases to trace variable values to determine the result.
  1. 22.2 Logical Operators
  2. 22.3 Comparison Operators
  3. 22.4 If Statements
  4. 22.9 While Loops
  5. 22.10 Loop and a Half
ATP.CS.7.a Use and apply decisions and loops in a program to solve a problem.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
  8. 22.10 Loop and a Half
  9. 23.1 Control Structures Challenges
ATP.M.7.a Decompose problems into parts to facilitate the design, implementation and review of increasingly complex programs.
  1. 4.3 Looping
ATP.PD.7.a Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 4.3 Looping
  2. 22.4 If Statements
  3. 22.5 For Loops in JavaScript
  4. 22.6 General For Loops
  5. 22.7 For Loop Practice
  6. 22.9 While Loops
  7. 22.10 Loop and a Half
  8. 23.1 Control Structures Challenges
ATP.PD.7.b Test, trace and debug to refine code.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
ATP.PD.7.c Identify procedures that utilize parameters.
IC.Cu.7.a Compare current technologies from the present to the past to evaluate the effect on people's everyday activities.
  1. 10.10 Impact of the Internet
IC.Cu.7.b Evaluate various technologies to identify issues of bias and accessibility.
  1. 10.10 Impact of the Internet
IC.Cu.7.c Identify and explore careers related to the field of computer science.
  1. 1.3 Impact of Cybersecurity
  2. 2.7 Hacking Ethics
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 8.4 Databases
  5. 8.9 Common Security Problems
IC.Cu.7.d Explain how computing impacts innovation in other fields.
  1. 10.10 Impact of the Internet
IC.SI.7.a Analyze and present beneficial and harmful effects of electronic communications to understand their impacts on interpersonal, global, economic, political, business and cultural interactions.
  1. 1.3 Impact of Cybersecurity
  2. 10.10 Impact of the Internet
IC.SLE.7.a Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
IC.SLE.7.b Identify the social and economic implications of privacy in the context of safety, law or ethics to understand how privacy impacts these areas.
  1. 2.1 Digital Footprint and Reputation
  2. 2.4 Privacy & Security
IC.SLE.7.c Evaluate the development of new technologies in communication, entertainment and business to understand the impact.
  1. 7.4 Software and Applications
  2. 10.10 Impact of the Internet
IC.SLE.7.d Provide appropriate credit when using resources or artifacts that are not our own.
  1. 2.6 Creative Credit & Copyright
IC.SLE.7.e Explain the connection between the longevity of data on the internet, personal online identity and personal privacy.
  1. 2.1 Digital Footprint and Reputation
  2. 2.4 Privacy & Security