Standards in this Framework
Standard | Description |
---|---|
SD.CYB.1.1 | Define the importance of the cybersecurity industry. |
SD.CYB.1.2 | Identify the role cybersecurity plays in personal usage. |
SD.CYB.1.3 | Identify the role cybersecurity plays in industry usage. |
SD.CYB.2.1 | Investigate the Confidentiality Integrity Availability (CIA) Triad – Security Models. |
SD.CYB.2.2 | Compare and contrast usability and security. |
SD.CYB.3.1 | Investigate encryption and encryption types. |
SD.CYB.3.2 | Investigate how businesses utilize security systems. |
SD.CYB.3.3 | Compare and contrast public versus private Wi-Fi. |
SD.CYB.3.4 | Explore processes that maintain integrity of data. |
SD.CYB.3.5 | Investigate data breaches and its impact on business and customers. |
SD.CYB.4.1 | Differentiate between threats, vulnerabilities, and attacks. |
SD.CYB.4.2 | Utilize adversarial thinking. |
SD.CYB.4.3 | Describe common security related software vulnerabilities. |
SD.CYB.4.4 | Explore social engineering techniques related to cybersecurity. |
SD.CYB.5.1 | Compare and contrast ethical versus non-ethical hacking. |
SD.CYB.5.2 | Understand confidentiality and the role it plays in cybersecurity. |
SD.CYB.5.3 | Discuss the impact of unethical and illegal hacking on quality of life. |
SD.CYB.5.4 | Evaluate how the role of value and ethics impacts laws and policy decisions. |
SD.CYB.5.5 | Evaluate proprietary information and protections. |
SD.CYB.6.1 | Identify personal interests and abilities related to cybersecurity careers. |
SD.CYB.6.2 | Investigate career opportunities, trends, and requirements related to cybersecurity careers. |
SD.CYB.6.3 | Identify skills needed for cybersecurity careers. |