Please enable JavaScript to use CodeHS

Ohio 8 Standards Mapping


Fundamentals of Cybersecurity

31 Standards in this Framework 23 Standards Mapped 74% Mapped to Course

Standard Lessons
CS.D.8.a Evaluate the advantages and limitations of existing computing devices to recommend design improvements based on analysis of how users interact with the device.
CS.HS.8.a Design projects that combine hardware and software components that could complete a task.
CS.T.8.a Use a systematic process to identify and evaluate the source of a routine computing problem. Select the best solution to solve the computing problem and communicate the solution to others.
  1. 12.1 Methodology
  2. 12.2 Support Practice
NI.N.8.a Model the role of hardware components to diagram the infrastructure of networks and the internet (including cloud servers).
  1. 8.5 Clients and Servers
  2. 10.4 Internet Hardware and Sending Information
  3. 11.3 Network Devices
NI.N.8.b Model protocols (i.e., rules) and explain why they are used to transmit data across networks and the internet.
  1. 10.8 Packets & Protocols
NI.N.8.c Explain how a system responds when information is lost to understand the effect it has on the transferred information.
  1. 10.8 Packets & Protocols
  2. 10.9 Viewing a Webpage
NI.C.8.a Explain how physical and digital security measures are used to protect electronic information.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
  3. 5.1 Cryptography, Cryptology, Cryptanalysis
  4. 7.6 Application Security
  5. 7.7 Browser Configuration
  6. 7.8 System Administration
  7. 8.9 Common Security Problems
  8. 8.10 SQL Injection Overview
  9. 8.11 Types of SQLi and Prevention
  10. 11.6 Network Communication
  11. 11.7 Network Management
NI.C.8.b Compare and contrast the effects of different types of malware to determine strategies for how to protect devices.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 2.4 Privacy & Security
  4. 8.9 Common Security Problems
  5. 11.6 Network Communication
  6. 11.7 Network Management
DA.DCS.8.a Interpret digital data collection tools to manage information effectively.
  1. 8.4 Databases
DA.DCS.8.b Identify data storage systems to define how data is stored and accessed.
  1. 8.4 Databases
  2. 11.4 Storage Options
DA.DCS.8.c Create a logical file structure to organize data in different storage systems to support individual and collaborative work.
DA.VC.8.a Evaluate data to construct a model or representation.
DA.VC.8.b Create a spreadsheet utilizing formulas, functions and graphs to represent and analyze data.
DA.IM.8.a Create and analyze models and simulations to accurately hypothesize a real-world situation.
ATP.A.8.a Create multiple pseudocode to solve a multi-step process and justify the most efficient solution.
  1. 21.1 Challenge Problems
  2. 23.1 Control Structures Challenges
ATP.VDR.8.a Analyze test cases and determine the range of valid solutions.
  1. 21.1 Challenge Problems
  2. 22.4 If Statements
  3. 22.9 While Loops
  4. 23.1 Control Structures Challenges
ATP.VDR.8.b Use a data structure to represent a collection.
  1. 4.5 Arrays and Objects
ATP.CS.8.a Use and apply decisions and loops in a program to solve a problem.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.4 If Statements
  4. 22.5 For Loops in JavaScript
  5. 22.6 General For Loops
  6. 22.7 For Loop Practice
  7. 22.9 While Loops
  8. 22.10 Loop and a Half
  9. 23.1 Control Structures Challenges
ATP.M.8.a Decompose problems and subproblems into parts to facilitate the design, implementation and review of complex programs.
ATP.PD.8.a Write code that utilizes algorithms, variables and control structures to solve problems or as a creative expression.
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
  3. 22.6 General For Loops
  4. 22.7 For Loop Practice
  5. 22.9 While Loops
  6. 22.10 Loop and a Half
  7. 23.1 Control Structures Challenges
ATP.PD.8.b Systematically test and refine programs using a range of test cases.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 23.1 Control Structures Challenges
ATP.PD.8.c Use procedures that utilize parameters to pass values.
IC.Cu.8.a Compare current technologies and how they affect the current economy.
  1. 10.10 Impact of the Internet
IC.Cu.8.b Propose potential guidelines/standards/criteria to positively impact bias and accessibility in the design of future technologies.
  1. 10.10 Impact of the Internet
IC.Cu.8.c Identify and explore careers related to the field of computer science.
  1. 1.3 Impact of Cybersecurity
  2. 2.7 Hacking Ethics
  3. 8.4 Databases
  4. 8.9 Common Security Problems
IC.Cu.8.d Explain how computing impacts innovation in other fields.
  1. 10.10 Impact of the Internet
IC.SI.8.a Evaluate the impacts of electronic communication on personal relationships to be able to evaluate differences between face-to-face and electronic communication.
  1. 7.4 Software and Applications
  2. 10.10 Impact of the Internet
IC.SLE.8.a Explain user privacy concerns related to the collection and generation of data that may not be evident through automated processes.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 7.7 Browser Configuration
IC.SLE.8.b Describe the social and economic implications of privacy in the context of safety, law or ethics to be global digital citizens.
  1. 2.1 Digital Footprint and Reputation
  2. 2.4 Privacy & Security
IC.SLE.8.c Identify ethical and legal security measures used to protect electronic information.
  1. 1.4 The CIA Triad
  2. 2.4 Privacy & Security
  3. 7.5 Software Licenses
IC.SLE.8.d Provide appropriate credit when using resources or artifacts that are not our own.
  1. 2.6 Creative Credit & Copyright