Please enable JavaScript to use CodeHS

Indiana Computer Science 3: Cybersecurity Standards Mapping

to

Advanced Cybersecurity

13 Standards in this Framework 13 Standards Mapped 100% Mapped to Course


Standard Lessons
CS3S-1.1 Describe and discuss key concepts in security, including confidentiality, integrity and availability, authentication, and access control.
  1. 3.6 Access Control
  2. 14.8 System Administration
CS3S-1.2 Describe and discuss key concepts in cybersecurity, including cryptology, cryptography, cryptanalysis, cipher, cryptographic algorithm, private and public key encryption, public key infrastructure, and trust/trustworthiness.
  1. 1.2 Encryption Algorithms
  2. 1.3 Advanced Cryptography
  3. 1.4 Hash Functions
  4. 1.6 Asymmetric Encryption
CS3S-1.3 Discuss the basic concepts of probability, random variables and probability distributions as they apply to information theory and cryptography.
  1. 1.4 Hash Functions
  2. 1.6 Asymmetric Encryption
CS3S-2.1 Demonstrate the techniques to transform plaintext into ciphertext, the use of hash functions for authentication and data integrity, and the use of private and public key encryption.
  1. 1.2 Encryption Algorithms
  2. 1.3 Advanced Cryptography
  3. 1.4 Hash Functions
  4. 1.5 Hash Function Development
  5. 1.6 Asymmetric Encryption
CS3S-2.2 Investigate security vulnerabilities in various data structures, such as out-of-bounds arrays and buffer overflows.
  1. 8.2 Assessing Risks
CS3S-3.1 Discuss various types of cyberattacks on software and software systems along with possible countermeasures and security controls that minimize risk and exposure
  1. 5.2 Malware Types and Prevention
  2. 8.2 Assessing Risks
  3. 14.6 Application Security
  4. 14.8 System Administration
CS3S-3.2 Discuss current industry standards, tools, and security practices in software development, including use of multiple layers of defenses, wireless security, and risks in 3rd party applications and libraries.
  1. 5.1 Network Attacks
  2. 14.6 Application Security
  3. 15.3 Network Devices
  4. 15.5 Network Options
CS3S-4.1 Explain the tradeoffs of developing a program in a typesafe language Implement secure coding and testing techniques including input validation, data sanitization, and exception handling.
  1. 8.2 Assessing Risks
CS3S-4.2 Describe when and how to properly use open source vs. closed source software.
  1. 7.4 Level 4: Data and Licenses
  2. 14.4 Software and Applications
  3. 14.5 Software Licenses
CS3S-4.3 Examine the need to update software to fix security vulnerabilities.
  1. 3.5 Mobile Devices
  2. 8.2 Assessing Risks
  3. 14.4 Software and Applications
  4. 14.6 Application Security
CS3S-5.1 Discuss the role of software security in a company-wide security policy.
  1. 7.2 Level 2: User Training
  2. 7.3 Level 3: Incident Response
  3. 14.6 Application Security
CS3S-5.2 Develop Secure Software Development Lifecycle.
  1. 7.2 Level 2: User Training
  2. 7.3 Level 3: Incident Response
  3. 7.4 Level 4: Data and Licenses
  4. 7.5 Level 5: Change Management
CS3S-5.3 Perform software security audit on a peer-reviewed project.
  1. 6.1 Project Security Assessment Report
  2. 14.6 Application Security