for South Carolina 6-8 — Fundamentals of Cybersecurity (2020)
Total Standards: 111Mapped: 80Completion: 72%
6.CS.1.1
Identify and describe the key functional components (e.g., input devices, output devices, processor, operating system, software applications, memory, storage) of a computer.
7.1 Operating Systems
10.1 Internal Components
10.2 Peripheral Devices
6.CS.1.2
Identify relevant problems and how they are solved using computer science and various types of computing devices.
9.10 Impact of the Internet
6.CS.2.1
Understand how software is acquired and installed.
7.4 Software and Applications
6.CS.3.1
Identify the source of a problem using a systematic process.
11.1 Methodology
11.2 Support Practice
6.CS.3.2
Identify informational resources for troubleshooting hardware and software problems.
11.1 Methodology
11.2 Support Practice
6.NI.1.1
Identify and define hardware required to connect to a network (e.g., routers, switches, wireless network interface cards/adapter, network cable, modem).
9.4 Internet Hardware and Sending Information
9.6 Domain Name System (DNS)
9.7 Routing
9.8 Packets & Protocols
9.9 Viewing a Webpage
10.3 Network Devices
6.NI.1.2
Define an IP address and identify different examples.
9.5 Internet Addresses
9.9 Viewing a Webpage
6.NI.1.3
Identify parts of a Uniform Resource Locator (URL).
9.5 Internet Addresses
9.9 Viewing a Webpage
6.NI.1.4
Define a packet and explain how they are used to transmit data across a network.
9.8 Packets & Protocols
9.9 Viewing a Webpage
6.NI.2.1
Compare and contrast use of networks and the internet by individuals and organizations.
7.8 System Administration
10.5 Network Options
6.NI.2.2
Identify security issues associated with transmitting data across networks.
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
6.DA.1.1
Understand that there are different number systems (i.e., base 10, binary, hexadecimal)
9.2 Notational Systems
9.3 Data Representation
6.DA.1.2
Understand conversions between different number systems.
9.2 Notational Systems
9.3 Data Representation
6.DA.2.1
Explore real-world data collection (e.g., identification number at lunch, teacher taking attendance, grocery store shopping card).
6.DA.3.1
Explore graphical representations of large data sets.
8.3 The Value of Data
6.DA.3.2
Represent one set of numerical data (e.g., histograms, box plots, dot plots).
6.DA.4.1
Explain how data is represented by a model (e.g., presentation software, clay model, poster).
8.3 The Value of Data
6.AP.1.1
Create and modify algorithms to express ideas and solve problems.
4.3 Looping
4.4 Branching
21.1 Challenge Problems
22.1 Booleans
22.2 Logical Operators
22.3 Comparison Operators
22.4 If Statements
22.5 For Loops in JavaScript
22.6 General For Loops
22.7 For Loop Practice
22.8 Random Numbers
22.9 While Loops
22.10 Loop and a Half
6.AP.1.2
Analyze and test algorithms for accuracy.
21.1 Challenge Problems
6.AP.2.1
Create algorithms that create, assign to, and read from variables.
4.1 Programming Concepts
22.1 Booleans
22.2 Logical Operators
22.3 Comparison Operators
22.4 If Statements
22.5 For Loops in JavaScript
22.8 Random Numbers
22.9 While Loops
6.AP.2.2
Identify the variables needed to solve a given problem and the data type (e.g., words, strings, integers, images, Boolean, float, list/arrays).
22.1 Booleans
6.AP.3.1
Identify and use simple control structures
4.3 Looping
4.4 Branching
22.4 If Statements
22.5 For Loops in JavaScript
22.6 General For Loops
22.7 For Loop Practice
22.9 While Loops
6.AP.3.2
Implement and analyze algorithms using simple control structures.
4.3 Looping
4.4 Branching
22.4 If Statements
22.5 For Loops in JavaScript
22.6 General For Loops
22.7 For Loop Practice
22.9 While Loops
6.AP.3.3
Recognize events and event handlers implied by a user interface (e.g., mouse click, keyboard strokes, screen touch).
6.AP.4.1
Understand how code can be reused throughout an algorithm and/or program.
4.2 Programming with Karel
4.3 Looping
21.1 Challenge Problems
6.AP.4.2
Reuse code multiple times within an algorithm and/or program.
4.3 Looping
21.1 Challenge Problems
6.AP.4.3
Understand and describe advantages of reusing code within an algorithm and/or program
4.2 Programming with Karel
4.3 Looping
21.1 Challenge Problems
6.AP.5.1
Use a block-based programming language to solve problems.
4.2 Programming with Karel
4.3 Looping
4.4 Branching
19.15 Your First Website
21.1 Challenge Problems
6.AP.5.2
Edit, compile, run, test, and debug a program.
19.15 Your First Website
21.1 Challenge Problems
6.AP.5.3
Use tools to express the design of a program (e.g., natural language, pseudocode, diagrams, flowcharts, comments).
4.3 Looping
4.6 Organizational Techniques
6.IC.1.1
Understand and explore how computer science is and can be used to solve problems in students’ daily lives (e.g., voter identification website, mobile applications for neighborhood issues).
9.10 Impact of the Internet
6.IC.1.2
Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).
9.10 Impact of the Internet
6.IC.2.1
Identify current communication methods and devices
6.IC.3.1
Identify guidelines for safely using the internet
2.1 Digital Footprint and Reputation
2.3 Internet Safety
6.IC.4.1
Identify unethical and illegal behavior.
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.2 Cyberbullying
2.4 Privacy & Security
2.7 Hacking Ethics
7.CS.1.1
Explore an expanded definition of computing devices (e.g., “internet of things,” wearable technology, robotics).
1.2 What is Cybersecurity?
9.10 Impact of the Internet
7.CS.1.2
Analyze relevant problems and how they are solved using computer science and various types of computing devices.
9.10 Impact of the Internet
7.CS.2.1
Understand the units of measure used to describe major hardware components (i.e., Peta-, Tera-, Giga-, Mega- Kilo-, Hz, Bit, Byte).
7.CS.3.1
Understand and communicate solutions to various computing problems.
10.2 Peripheral Devices
10.3 Network Devices
11.1 Methodology
11.2 Support Practice
7.CS.3.2
Understand how rebooting a device can solve problems.
11.1 Methodology
11.2 Support Practice
7.NI.1.1
Identify and compare Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs).
10.5 Network Options
7.NI.1.2
Define and understand how the internet is a network of Wide Area Networks (WANs).
9.4 Internet Hardware and Sending Information
10.5 Network Options
7.NI.1.3
Compare and contrast network topologies (e.g., ring, star, mesh).
7.NI.2.1
Identify hardware and software methods for protecting data transmitted across networks
5.1 Cryptography, Cryptology, Cryptanalysis
7.6 Application Security
7.7 Browser Configuration
7.8 System Administration
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
10.6 Network Communication
10.7 Network Management
7.NI.2.2
Identify physical methods for securing devices (e.g., restricted access, hardware firewall, internet filter).
7.8 System Administration
7.DA.1.1
Understand and connect file extensions to their associated software applications (e.g., .ppt, .pdf, .mp3).
7.DA.1.2
Describe how a picture, sound/song, and video are stored digitally (e.g., Red, Green, and Blue (RGB), pixels, .wav).
7.DA.2.1
Identify computing devices that assist with data collection (i.e., thermometers, barcode scanners, biometrics, sensors, radio-frequency identification (RFID), wearable technology).
7.DA.3.1
Create various graphical representations of large data sets
7.DA.3.2
Represent two sets of numerical data (e.g., histograms, box plots, dot plots)
7.DA.4.1
Create a model to represent collected data (e.g., presentation software, clay model, poster).
7.AP.1.1
Combine multiple algorithms to express ideas and solve more complex problems
21.1 Challenge Problems
7.AP.1.2
Analyze and test algorithms using proper and improper values.
7.AP.2.1
Deduce the value of a variable from execution of specific code.
22.4 If Statements
7.AP.2.2
Develop programs that prompt the user for input that is used to determine the value of variables
7.AP.2.3
Determine and use appropriate data types to store information.
22.1 Booleans
7.AP.3.1
Understand and explain Boolean logic and logic operators.
22.1 Booleans
22.2 Logical Operators
22.3 Comparison Operators
22.4 If Statements
7.AP.3.2
Identify and use compound conditional statements.
22.2 Logical Operators
22.3 Comparison Operators
22.4 If Statements
7.AP.4.1
Identify procedures, functions, and methods that can be reused.
4.2 Programming with Karel
4.3 Looping
21.1 Challenge Problems
7.AP.4.2
Design a program by decomposing a problem into simple tasks
4.3 Looping
21.1 Challenge Problems
7.AP.5.1
Use control structures to create a program that solves a specific problem
4.3 Looping
4.4 Branching
21.1 Challenge Problems
22.4 If Statements
22.5 For Loops in JavaScript
22.6 General For Loops
22.7 For Loop Practice
22.9 While Loops
7.AP.5.2
Use a block-based programming language to solve problems of increasing complexity.
4.2 Programming with Karel
4.3 Looping
4.4 Branching
21.1 Challenge Problems
7.IC.1.1
Understand and explore how computer science is and can be used to solve problems in students’ daily lives (e.g., voter identification website, mobile applications for neighborhood issues).
9.10 Impact of the Internet
7.IC.1.2
Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.10 Impact of the Internet
7.IC.2.1
Describe current communication methods and devices.
7.IC.3.1
Understand precautions to protect personal information (i.e., password strength, antivirus software).
1.4 The CIA Triad
2.4 Privacy & Security
7.6 Application Security
7.7 Browser Configuration
8.9 Common Security Problems
7.IC.4.1
Understand the consequences of unethical and illegal behavior online (e.g., social media, gaming, cyberbullying).
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
7.IC.5.1
Understand and communicate the role of women in the evolution of computing.
7.IC.5.2
Recognize minority computer scientists who have advanced computing.
7.IC.6.1
Explain how computer science plays a role in every industry.
9.10 Impact of the Internet
7.IC.7.1
Understand and communicate the changes in computing and computer science over time.
5.2 History of Cryptography
9.10 Impact of the Internet
7.IC.7.2
Understand and communicate the history and development of the Internet.
9.10 Impact of the Internet
8.CS.1.1
Understand and communicate relevant problems and how they are solved using computer science and various types of computing devices.
9.10 Impact of the Internet
8.CS.1.2
Compare and contrast the five disciplines of computing: computer science, software engineering, information technology, information systems, and computer engineering.
8.CS.2.1
Describe the relationship between the binary system and hardware
9.2 Notational Systems
9.4 Internet Hardware and Sending Information
8.CS.2.2
Design and create a computer system based upon the needs of the users in various career fields.
10.2 Peripheral Devices
8.CS.2.3
Determine appropriate operating systems and software based upon the needs of users in various career fields.
7.2 Comparing Operating Systems
7.3 Compatibility
7.4 Software and Applications
8.CS.3.1
Understand computer hardware and software compatibility.
7.3 Compatibility
8.CS.3.2
Understand and solve hardware and software problems using industry documentation.
11.1 Methodology
11.2 Support Practice
8.NI.1.1
Identify different protocols and their functions (e.g., Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Internet Protocol (IP), Transmission Control Protocol (TCP)).
9.5 Internet Addresses
9.9 Viewing a Webpage
10.6 Network Communication
8.NI.1.2
Design and/or configure a small network using a switch and a router
10.5 Network Options
8.NI.1.3
Identify relevant problems and how they are solved using networks and the internet.
9.10 Impact of the Internet
8.NI.2.1
Discuss and understand recent events and trends regarding cybercrimes (i.e., identity theft, hacking).
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
8.NI.2.2
Discuss and understand the impact of computing copyright issues (i.e., piracy, plagiarism).
2.6 Creative Credit & Copyright
7.5 Software Licenses
8.DA.1.1
Compare and contrast characteristics of a variety of file formats (e.g., software compatibility, file size, compressed and uncompressed files, transparency).
7.3 Compatibility
8.DA.1.2
Compare and contrast current storage mediums and their application (e.g., flash drives, hard drives, networks, cloud).
8.4 Databases
8.5 Clients and Servers
10.4 Storage Options
8.DA.2.1
Utilize computing devices that assist with data collection (i.e., thermometers, barcode scanners, biometrics, sensors, radio-frequency identification (RFID), wearable technology).
8.DA.3.1
Identify components of infographics that can be used to represent numerical data (e.g., scatterplots, stem plots).
8.DA.4.1
Make inferences based on collected data.
8.DA.4.2
Use a model to predict specific behaviors and/or outcomes.
8.AP.1.1
Evaluate an algorithm by criteria such as accessibility, effectiveness, and usability to solve a problem.
21.1 Challenge Problems
8.AP.1.2
Develop formal criteria to fully evaluate algorithm design.
8.AP.2.1
Understand how variables are stored in memory.
8.AP.2.2
Use variables that store more than one value to solve more complex problems (i.e., arrays, lists).
4.5 Arrays and Objects
8.AP.3.1
Implement and analyze algorithms using iteration.
4.3 Looping
21.1 Challenge Problems
22.5 For Loops in JavaScript
22.6 General For Loops
22.7 For Loop Practice
22.9 While Loops
8.AP.3.2
Use nested control structures to solve a problem.
21.1 Challenge Problems
8.AP.4.1
Create a function that accepts arguments.
8.AP.4.2
Extend or reuse code from another program.
8.AP.5.1
Use tools to express the design of a program (e.g., natural language, pseudocode, diagrams, flowcharts, comments).
4.6 Organizational Techniques
8.AP.5.2
Collaborate with peers while programming.
8.AP.5.3
Identify and utilize helpful resources when programming.
8.IC.1.1
Understand and explore how computer science is and can be used to solve problems in students’ daily lives (e.g., voter identification website, mobile applications for neighborhood issues).
9.10 Impact of the Internet
8.IC.1.2
Analyze positive and negative impacts of computing on society (e.g., personal, health, workforce, economy, education, culture, environment).
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
7.4 Software and Applications
9.10 Impact of the Internet
8.IC.2.1
Compare and contrast current communication methods and devices.
8.IC.3.1
Identify risks associated with sharing information digitally (i.e., phishing, identity theft, hacking).
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.9 Common Security Problems
8.IC.4.1
Identify recent laws that have been created to govern computer use.
8.IC.5.1
Discuss and understand the lack of computing resources in areas in relation to his or her state, country, and world.
9.1 Introduction to the Internet
9.10 Impact of the Internet
8.IC.6.1
Identify traditional and nontraditional careers that use computer science.
1.3 Impact of Cybersecurity
8.4 Databases
8.9 Common Security Problems
8.IC.7.1
Analyze the impact of computing and computer science over time
5.2 History of Cryptography
9.10 Impact of the Internet
8.IC.7.2
Demonstrate an understanding of Moore’s Law (i.e., the number of transistors per square inch on integrated circuits had doubled every year since their invention).