for Idaho Digital Literacy — Fundamentals of Cybersecurity
Total Standards: 21Mapped: 18Completion: 85%
9-12.CS.1.4
Create or modify a program that uses different forms of input and output.
Fundamentals of Cybersecurity
14.4 User Input
Introduction to Python Programming
3.3 User Input
9-12.CS.1.6
Create a model of how embedded systems sense, process, and interact in a given environment.
9-12.CS.2.6
Compare and contrast the viewpoints on cybersecurity from the perspective of security experts, privacy advocates, and the government.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
9-12.CS.3.4
Identify and evaluate the beneficial and harmful effects of computing innovations on behavior and culture.
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
5.9 Impact of the Internet
9-12.CS.3.5
Debate how the issues of equity, data access, and distribution of computing resources create a digital divide in a global society.
Fundamentals of Cybersecurity
5.9 Impact of the Internet
9-12.CS.3.8
Research and explain the social, moral, ethical, and legal impacts of artificial intelligence systems and respective usage.
Introduction to AI for High School (1 month)
1.5 Who Builds AI?
4.1 Effects of Using Biased AI
4.4 Project: AI on Trial
9-12.CS.5.2
Design algorithms using sequence, selection, iteration and recursion. *Recursion will be addressed in an upper computer science course.
Fundamentals of Cybersecurity
14.6 Branching: If Statements
14.8 Looping: For Loops
Introduction to Python Programming
5.2 If Statements
7.2 For Loops
28.10 For Loops
9-12.CS.5.1
Diagram the flow and execution and output of a given program.
9-12.CS.3.2
Explain the social and economic implications associated with unethical computing practices.
Fundamentals of Cybersecurity
1.4 Cyber Ethics and Laws
9-12.CS.3.3
Discuss trade-offs such as privacy, safety, and convenience associated with the collection and large-scale analysis of personal information.
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
1.5 Personal Data Security
8.1 Data as a Resource
9-12.CS.3.7
Understand and define artificial intelligence.
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
Introduction to AI for High School (1 month)
1.1 Human & Artificial Intelligence
9-12.CS.5.23
Critically examine algorithms and design an original algorithm (adapt, remix, improve).
Fundamentals of Cybersecurity
14.2 Printing in Python
14.6 Branching: If Statements
Introduction to Python Programming
3.1 Printing in Python
3.5 String Operators
5.1 Booleans
5.2 If Statements
7.3 Break and Continue
28.2 Printing in Python
28.5 String Operators
9-12.ICT.2.1
Develop and manage their digital identity and understand the permanence of their digital actions including the effect on current and future reputation.
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
9-12.ICT.2.3
Demonstrate an understanding of the rights and obligations of using and sharing intellectual
property.
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
9-12.ICT.2.4
Maintain their digital security and understand data collection technology used to track their online activity.
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
1.5 Personal Data Security
8.1 Data as a Resource
9-12.CS.3.1
Demonstrate responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software.
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
1.4 Cyber Ethics and Laws
9-12.ICT.2.2
Engage in positive, safe, legal and ethical behavior when using technology.
Fundamentals of Cybersecurity
1.1 Digital Footprint and Responsibility
1.4 Cyber Ethics and Laws
ODC.9-10.5
Manage personal data to maintain digital privacy and security and be conscious and aware of data-collection technology used to track and exploit navigation online.
Fundamentals of Cybersecurity
1.2 Personal Data and Collection
1.5 Personal Data Security
8.1 Data as a Resource
ODC.11-12.5
Demonstrate the responsible and ethical use of information and communication technologies by distinguishing between kinds of information that should and should not be publicly shared and describing the consequences of a poor decision.
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
1.4 Cyber Ethics and Laws
ODC.9-12.6.
Integrate multiple sources of information presented in diverse digital media, evaluating the
credibility and accuracy of each source.
Fundamentals of Cybersecurity
1.3 Can All Information Be Trusted?
ODC.9-12.8.
Make strategic use of digital media presentations to enhance understanding of findings,
reasoning, and evidence and to add interest.