Please enable JavaScript to use CodeHS

Indiana Computer Science 3: Cybersecurity Standards Mapping

to

Fundamentals of Cybersecurity

13 Standards in this Framework 10 Standards Mapped 76% Mapped to Course


Standard Lessons
CS3S-1.1 Describe and discuss key concepts in security, including confidentiality, integrity and availability, authentication, and access control.
  1. 1.4 The CIA Triad
  2. 7.8 System Administration
CS3S-1.2 Describe and discuss key concepts in cybersecurity, including cryptology, cryptography, cryptanalysis, cipher, cryptographic algorithm, private and public key encryption, public key infrastructure, and trust/trustworthiness.
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
  2. 5.2 History of Cryptography
  3. 5.3 Basic Crypto Systems: Caesar Cipher
  4. 5.4 Basic Crypto Systems: Cracking Caesar
  5. 5.5 Basic Crypto Systems: Vigenere Cipher
CS3S-1.3 Discuss the basic concepts of probability, random variables and probability distributions as they apply to information theory and cryptography.
CS3S-2.1 Demonstrate the techniques to transform plaintext into ciphertext, the use of hash functions for authentication and data integrity, and the use of private and public key encryption.
CS3S-2.2 Investigate security vulnerabilities in various data structures, such as out-of-bounds arrays and buffer overflows.
  1. 8.10 SQL Injection Overview
  2. 8.11 Types of SQLi and Prevention
  3. 9.1 Project: Security Assessment Report
CS3S-3.1 Discuss various types of cyberattacks on software and software systems along with possible countermeasures and security controls that minimize risk and exposure
  1. 1.3 Impact of Cybersecurity
  2. 7.6 Application Security
  3. 7.8 System Administration
  4. 8.9 Common Security Problems
CS3S-3.2 Discuss current industry standards, tools, and security practices in software development, including use of multiple layers of defenses, wireless security, and risks in 3rd party applications and libraries.
  1. 7.6 Application Security
  2. 8.11 Types of SQLi and Prevention
  3. 11.3 Network Devices
  4. 11.5 Network Options
CS3S-4.1 Explain the tradeoffs of developing a program in a typesafe language Implement secure coding and testing techniques including input validation, data sanitization, and exception handling.
  1. 8.11 Types of SQLi and Prevention
CS3S-4.2 Describe when and how to properly use open source vs. closed source software.
  1. 7.4 Software and Applications
  2. 7.5 Software Licenses
CS3S-4.3 Examine the need to update software to fix security vulnerabilities.
  1. 7.4 Software and Applications
  2. 7.6 Application Security
CS3S-5.1 Discuss the role of software security in a company-wide security policy.
  1. 7.6 Application Security
CS3S-5.2 Develop Secure Software Development Lifecycle.
CS3S-5.3 Perform software security audit on a peer-reviewed project.
  1. 7.6 Application Security