Please enable JavaScript to use CodeHS

Standards Mapping

for Indiana Computer Science 3: Cybersecurity

13

Standards in this Framework

13

Standards Mapped

100%

Mapped to Course

Standard Lessons
CS3S-1.1
Describe and discuss key concepts in security, including confidentiality, integrity and availability, authentication, and access control.
  1. 3.6 Access Control
CS3S-1.2
Describe and discuss key concepts in cybersecurity, including cryptology, cryptography, cryptanalysis, cipher, cryptographic algorithm, private and public key encryption, public key infrastructure, and trust/trustworthiness.
  1. 1.2 Encryption Algorithms
  2. 1.3 Advanced Cryptography
  3. 1.4 Hash Functions
  4. 1.6 Asymmetric Encryption
CS3S-1.3
Discuss the basic concepts of probability, random variables and probability distributions as they apply to information theory and cryptography.
  1. 1.4 Hash Functions
  2. 1.6 Asymmetric Encryption
CS3S-2.1
Demonstrate the techniques to transform plaintext into ciphertext, the use of hash functions for authentication and data integrity, and the use of private and public key encryption.
  1. 1.2 Encryption Algorithms
  2. 1.3 Advanced Cryptography
  3. 1.4 Hash Functions
  4. 1.5 Hash Function Development
  5. 1.6 Asymmetric Encryption
CS3S-2.2
Investigate security vulnerabilities in various data structures, such as out-of-bounds arrays and buffer overflows.
  1. 8.2 Assessing Risks
CS3S-3.1
Discuss various types of cyberattacks on software and software systems along with possible countermeasures and security controls that minimize risk and exposure
  1. 5.2 Malware Types and Prevention
  2. 8.2 Assessing Risks
CS3S-3.2
Discuss current industry standards, tools, and security practices in software development, including use of multiple layers of defenses, wireless security, and risks in 3rd party applications and libraries.
  1. 5.1 Network Attacks
CS3S-4.1
Explain the tradeoffs of developing a program in a typesafe language Implement secure coding and testing techniques including input validation, data sanitization, and exception handling.
  1. 8.2 Assessing Risks
CS3S-4.2
Describe when and how to properly use open source vs. closed source software.
  1. 7.4 Level 4: Data and Licenses
CS3S-4.3
Examine the need to update software to fix security vulnerabilities.
  1. 3.5 Mobile Devices
  2. 8.2 Assessing Risks
CS3S-5.1
Discuss the role of software security in a company-wide security policy.
  1. 7.2 Level 2: User Training
  2. 7.3 Level 3: Incident Response
CS3S-5.2
Develop Secure Software Development Lifecycle.
  1. 7.2 Level 2: User Training
  2. 7.3 Level 3: Incident Response
  3. 7.4 Level 4: Data and Licenses
  4. 7.5 Level 5: Change Management
CS3S-5.3
Perform software security audit on a peer-reviewed project.
  1. 6.1 Project Security Assessment Report