Please enable JavaScript to use CodeHS

Missouri 9-10 Standards Mapping

to

Fundamentals of Cybersecurity

36 Standards in this Framework 21 Standards Mapped 58% Mapped to Course


Standard Lessons
CS.D.01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 10.2 Notational Systems
CS.HS.01 Explain the abstraction and interactions between application software, system software and hardware.
  1. 7.1 Operating Systems
  2. 7.4 Software and Applications
  3. 10.2 Notational Systems
  4. 11.1 Internal Components
CS.T.01 Develop, communicate and apply systematic troubleshooting strategies for correction of errors in computing systems.
  1. 12.1 Methodology
  2. 12.2 Support Practice
NI.NCO.01 Evaluate the scalability and reliability of networks by identifying and illustrating the basic components of computer networks (e.g., routers, switches, servers) and network protocols (e.g., IP, DNS).
  1. 10.4 Internet Hardware and Sending Information
  2. 10.5 Internet Addresses
  3. 10.6 Domain Name System (DNS)
  4. 10.7 Routing
  5. 11.3 Network Devices
  6. 11.6 Network Communication
NI.NCO.02 Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.5 Network Options
  3. 11.6 Network Communication
NI.C.01 Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.
  1. 2.4 Privacy & Security
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
  4. 7.8 System Administration
  5. 11.6 Network Communication
  6. 11.7 Network Management
NI.C.02 Illustrate how sensitive data can be affected by attacks.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
  3. 8.9 Common Security Problems
  4. 8.10 SQL Injection Overview
NI.C.03 Recommend security measures to address various scenarios based on information security principles.
  1. 8.9 Common Security Problems
  2. 8.11 Types of SQLi and Prevention
  3. 11.6 Network Communication
  4. 11.7 Network Management
NI.C.04 Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise and government.
  1. 7.7 Browser Configuration
  2. 7.8 System Administration
  3. 8.9 Common Security Problems
  4. 8.11 Types of SQLi and Prevention
DA.S.02 Evaluate the trade-offs in how data is organized and stored digitally.
  1. 8.4 Databases
  2. 8.5 Clients and Servers
  3. 11.4 Storage Options
DA.S.01 Translate and compare different bit representations of data types, such as characters, numbers and images.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
DA.CVT.02 Explain the insights and knowledge gained from digitally processed data by using appropriate visualizations, notions and precise language.
DA.CVT.01 Create data visualizations to help others better understand real-world phenomena.
DA.CVT.03 Evaluate and refine computational artifacts to make them more usable and accessible.
DA.IM.01 Show the relationships between collected data elements using computational models.
DA.IM.02 Refine computational models to better represent the relationships among different elements of data collected from a phenomenon or process.
AP.A.01 Create a prototype that uses algorithms (e.g., searching, sorting, finding shortest distance) to provide a possible solution for a real-world problem.
AP.V.01 Create problem solutions that utilize primitive variables (e.g., strings, ints, Booleans, doubles).
  1. 4.1 Programming Concepts
  2. 22.1 Booleans
AP.V.02 Demonstrate the use of advanced variables (e.g., lists, arrays, objects) to simplify solutions, generalizing computational problems instead of repeatedly using primitive variables.
  1. 4.5 Arrays and Objects
AP.C.01 Apply the concepts of specific control structures (e.g., sequence, conditionals, repetition, procedures) considering program efficiencies such as readability, performance and memory usage.
  1. 22.4 If Statements
  2. 22.5 For Loops in JavaScript
  3. 22.9 While Loops
AP.M.01 Break down a solution into procedures using systematic analysis and design utilizing functional abstraction.
AP.M.02 Create computational artifacts (file, graphic, video, audio) by systematically organizing, manipulating and/or processing data.
AP.PD.01 Using visual aids and documentation, illustrate the design elements and data flow (e.g., flowcharts, pseudocode) of the development of a program.
  1. 4.6 Organizational Techniques
AP.PD.02 Create a program by analyzing a problem and/or process, developing and documenting a solution, testing outcomes, debugging errors and adapting the program for a variety of users.
AP.PD.04 While collaborating in a team, develop, test and refine programs that solve practical problems or allow self-expression.
AP.PD.05 Evaluate and refine computational artifacts to make them more user-friendly, efficient and/or accessible.
IC.C.01 Evaluate the ways computing impacts personal, ethical, social, economic and cultural practices.
  1. 1.2 What is Cybersecurity?
  2. 7.4 Software and Applications
  3. 10.10 Impact of the Internet
IC.C.02 Test and refine computational artifacts to reduce bias and equity deficits.
IC.C.03 Demonstrate how a given algorithm applies to problems across disciplines.
IC.SI.01 Demonstrate through collaboration on a project how computing increases connectivity among people of various cultures.
IC.SI.02 Explain how the degrees of communication afforded by computing have impacted the nature and content of career fields.
  1. 3.1 Project: Public Service Announcement
  2. 10.10 Impact of the Internet
IC.SLE.01 Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 7.5 Software Licenses
IC.SLE.02 Explain the privacy concerns related to the collection and analysis of information about individuals that may not be evident to users.
  1. 2.4 Privacy & Security
  2. 7.5 Software Licenses
  3. 7.7 Browser Configuration
IC.SLE.03 Evaluate the social and economic consequences of how law and ethics interact with digital aspects of privacy, data, property, information and identity.
  1. 2.1 Digital Footprint and Reputation
  2. 2.4 Privacy & Security
AP.SLE.04 Define and classify a variety of software licensing schemes (e.g., open source, freeware, commercial) and discuss the advantages and disadvantages of each scheme in software development.
  1. 7.5 Software Licenses
IC.SLE.05 Identify and explain the potential impacts and implications of emerging technologies on larger social economic and political structures with evidence from credible sources.