Please enable JavaScript to use CodeHS

Kansas 6-8 Standards Mapping

to

Fundamentals of Cybersecurity

26 Standards in this Framework 14 Standards Mapped 53% Mapped to Course


Standard Lessons
8.CS.D.01 Develop and implement a process to evaluate existing computing devices and recommend improvements to design based on analysis of how other users interact with the device. (CSTA Practice - P3)
8.CS.HS.01 Model a computing system involving multiple considerations and potential tradeoffs of software and hardware, such as functionality, cost, size, speed, accessibility, and aesthetics (CSTA Practice - P5)
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
8.CS.IO.01 Know and apply grade-level appropriate skills with input and output devices. (CSTA Practice - P7)
  1. 11.2 Peripheral Devices
8.CS.T.01 Systematically identify, fix, and document increasingly complex software and hardware problems with computing devices and their components.(CSTA Practice - P6)
  1. 12.1 Methodology
  2. 12.2 Support Practice
8.NI.NCO.01 Explain protocols and their importance to data transmission; model how packets are broken down into smaller pieces and how they are delivered.(CSTA Practice - P4)
  1. 10.8 Packets & Protocols
8.NI.C.01 Evaluate physical and digital procedures that could be implemented to protect electronic data/information; explain the impacts of hacking, ransomware, scams, fake scans, and ethical/legal concerns.(CSTA Practice - P7)
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 7.8 System Administration
  5. 8.9 Common Security Problems
  6. 8.11 Types of SQLi and Prevention
8.NI.C.02 Compare the advantages and disadvantages of multiple methods of encryption to model the secure transmission of information.(CSTA Practice - P4)
  1. 5.1 Cryptography, Cryptology, Cryptanalysis
8.DA.S.01 Analyze multiple methods of representing data and choose the most appropriate method for representing data.(CSTA Practice - P4)
  1. 10.3 Data Representation
8.DA.C.01 Develop, implement, and refine a process that utilizes computational tools to collect meaningful data. (CSTA Practice - P6)
8.DA.VT.01 Develop, implement, and refine a process to make data more useful and reliable.(CSTA Practice - P6)
8.DA.IM.01 Refine computational models based on the data generated by the models.(CSTA Practice - P5, P4)
8.AP.A.01 Design algorithms in natural language, flow and control diagrams, comments within code, and/or pseudocode to solve complex problems. (CSTA Practice - P4)
  1. 4.6 Organizational Techniques
8.AP.V.01 Create programs using variables with purposeful and thoughtful naming conventions for identifiers to improve program readability. (CSTA Practice - P5)
  1. 4.1 Programming Concepts
8.AP.C.01 Develop programs that utilize combinations of nested repetition, compound conditionals, procedures without parameters, and the manipulation of variables representing different data types.(CSTA Practice - P5)
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
8.AP.M.01 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of complex programs.(CSTA Practice - P3)
8.AP.PD.01 Seek and incorporate feedback from team members and users to refine a solution to a problem that meets the needs of diverse users.(CSTA Practice - P2, P1)
8.AP.PD.02 Incorporate existing code, media, and libraries into original programs of increasing complexity and give attribution. (CSTA Practice - P4, P5, P7)
8.AP.PD.03 Systematically test and refine programs using a range of student created inputs.(CSTA Practice - P6)
8.AP.PD.04 Explain how effective communication between participants is required for successful collaboration when developing computational artifacts.(CSTA Practice - P2)
8.AP.PD.05 Document text-based programs of increasing complexity in order to make them easier to follow, test, and debug.(CSTA Practice - P7)
  1. 4.6 Organizational Techniques
8.IC.C.01 Describe the trade-offs associated with computing technologies (e.g. automation), explaining their effects on economies and global societies, and explore careers related to the field of computer science.(CSTA Practice - P7)
  1. 10.10 Impact of the Internet
8.IC.C.02 Evaluate and improve the design of existing technologies to meet the needs of diverse users and increase accessibility and usability (CSTA Practice - P1)
8.IC.SI.01 Communicate and publish key ideas and details individually or collaboratively in a way that informs, persuades, and/or entertains using a variety of digital tools and media-rich resources. Describe and use safe, appropriate, and responsible practices (netiquette) when participating in online communities (e.g., discussion groups, blogs, social networking sites).(CSTA Practice - P2, P5)
  1. 2.3 Internet Safety
  2. 3.1 Project: Public Service Announcement
8.IC.H.01 Identify and describe how the prominent figures in computer science have impacted and/or progressed the field. (CSTA Practice - P3)
8.IC.SLE.01 Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.(CSTA Practice - P7)
  1. 2.7 Hacking Ethics
8.IC.CP.01 Formulate a computer-science based solution for a problem or issue by gathering input from local / regional industry members (CSTA Practice - P2, P5)