- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
South Dakota Cybersecurity Framework
Standards
Standard | Description | |
---|---|---|
SD.CYB.1.1 | Define the importance of the cybersecurity industry. | Lessons |
SD.CYB.1.2 | Identify the role cybersecurity plays in personal usage. | Lessons |
SD.CYB.1.3 | Identify the role cybersecurity plays in industry usage. | Lessons |
SD.CYB.2.1 | Investigate the Confidentiality Integrity Availability (CIA) Triad – Security Models. | Lessons |
SD.CYB.2.2 | Compare and contrast usability and security. | Lessons |
SD.CYB.3.1 | Investigate encryption and encryption types. | Lessons |
SD.CYB.3.2 | Investigate how businesses utilize security systems. | Lessons |
SD.CYB.3.3 | Compare and contrast public versus private Wi-Fi. | Lessons |
SD.CYB.3.4 | Explore processes that maintain integrity of data. | Lessons |
SD.CYB.3.5 | Investigate data breaches and its impact on business and customers. | Lessons |
SD.CYB.4.1 | Differentiate between threats, vulnerabilities, and attacks. | Lessons |
SD.CYB.4.2 | Utilize adversarial thinking. | Lessons |
SD.CYB.4.3 | Describe common security related software vulnerabilities. | Lessons |
SD.CYB.4.4 | Explore social engineering techniques related to cybersecurity. | Lessons |
SD.CYB.5.1 | Compare and contrast ethical versus non-ethical hacking. | Lessons |
SD.CYB.5.2 | Understand confidentiality and the role it plays in cybersecurity. | Lessons |
SD.CYB.5.3 | Discuss the impact of unethical and illegal hacking on quality of life. | Lessons |
SD.CYB.5.4 | Evaluate how the role of value and ethics impacts laws and policy decisions. | Lessons |
SD.CYB.5.5 | Evaluate proprietary information and protections. | Lessons |
SD.CYB.6.1 | Identify personal interests and abilities related to cybersecurity careers. | Lessons |
SD.CYB.6.2 | Investigate career opportunities, trends, and requirements related to cybersecurity careers. | Lessons |
SD.CYB.6.3 | Identify skills needed for cybersecurity careers. | Lessons |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company