Please enable JavaScript to use CodeHS

Arizona 8 Standards Mapping

to

Fundamentals of Cybersecurity

23 Standards in this Framework 14 Standards Mapped 60% Mapped to Course


Standard Lessons
8.CS.D.1 Improve the design of computing devices based on an analysis of how users interact them, and consider unintended consequences.
8.CS.HS.1 Design and evaluate projects that combine hardware and software components to collect and exchange data.
8.CS.T.1 Systematically identify and develop strategies to fix problems with computing devices and their components.
  1. 11.3 Network Devices
  2. 12.1 Methodology
  3. 12.2 Support Practice
8.NI.C.1 Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
  4. 6.1 Project: Classic Cipher Newscast
8.NI.C.2 Evaluate how various physical and digital security measures protect electronic information and how a lack of such measures could lead to vulnerabilities.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
  6. 8.9 Common Security Problems
  7. 8.10 SQL Injection Overview
  8. 8.11 Types of SQLi and Prevention
8.NI.NCO.1 Develop models to illustrate the role of protocols in transmitting data across networks and the Internet.
  1. 10.8 Packets & Protocols
8.DA.CVT.1 Collect data using computational tools and transform the data to make it more meaningful and useful.
8.DA.S.1 Represent data using multiple encoding schemes including binary and ASCII.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
8.DA.IM.1 Design computational models and evaluate them based on the reliability and validity of the data they generate.
8.AP.A.1 Develop planning strategies, such as flowcharts or pseudocode, to develop algorithms to address complex problems.
  1. 21.1 Challenge Problems
8.AP.V.1 Create named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
  3. 22.1 Booleans
  4. 22.2 Logical Operators
  5. 22.3 Comparison Operators
  6. 22.4 If Statements
8.AP.C.1 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals.
  1. 4.3 Looping
  2. 21.1 Challenge Problems
8.AP.M.1 Decompose problems into parts to facilitate the design, implementation, and review of programs.
  1. 21.1 Challenge Problems
8.AP.M.2 Create procedures with parameters to organize code and make it easier to reuse.
8.AP.PD.1 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
8.AP.PD.2 Incorporate existing code, media, and libraries into original programs, and give attribution.
8.AP.PD.3 Systematically test and refine programs using a range of possible inputs.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 21.1 Challenge Problems
  4. 22.4 If Statements
  5. 22.9 While Loops
8.AP.PD.4 Distribute and execute tasks while maintaining a project timeline when collaboratively developing computational artifacts.
8.AP.PD.5 Document programs to make them easier to follow, test, and debug.
  1. 4.6 Organizational Techniques
8.IC.C.1 Compare and contrast tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 10.10 Impact of the Internet
8.IC.C.2 Develop a solution to address an issue of bias or accessibility in the design of existing technologies.
8.IC.SI.1 Collaborate with contributors by using digital technologies when creating a computational product.
  1. 3.1 Project: Public Service Announcement
8.IC.SLE.1 Evaluate the benefits and risks associated with sharing information digitally.
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
  5. 8.11 Types of SQLi and Prevention