Please enable JavaScript to use CodeHS

Mississippi 6-8 Standards Mapping

to

Fundamentals of Cybersecurity

23 Standards in this Framework 13 Standards Mapped 56% Mapped to Course


Standard Lessons
CS.2.1 Recommend improvements to the design of computing devices based on an analysis of how users interact with the devices
CS.2.2 Design projects that combine hardware and software components to collect and exchange data.
CS.2.3 Systematically identify and fix problems with computing devices and their components.
  1. 12.1 Methodology
  2. 12.2 Support Practice
NI.2.1 Model the role of protocols in transmitting data across networks and the Internet
  1. 10.6 Domain Name System (DNS)
  2. 10.7 Routing
  3. 10.8 Packets & Protocols
  4. 10.9 Viewing a Webpage
  5. 19.13 Viewing Websites
NI.2.2 Explain how physical and digital security measures protect electronic information
  1. 2.4 Privacy & Security
  2. 5.1 Cryptography, Cryptology, Cryptanalysis
  3. 7.6 Application Security
  4. 7.7 Browser Configuration
  5. 7.8 System Administration
  6. 8.10 SQL Injection Overview
  7. 8.11 Types of SQLi and Prevention
  8. 11.6 Network Communication
  9. 11.7 Network Management
NI.2.3 Apply multiple methods of encryption to model the secure transmission of information.
  1. 5.3 Basic Crypto Systems: Caesar Cipher
  2. 5.4 Basic Crypto Systems: Cracking Caesar
  3. 5.5 Basic Crypto Systems: Vigenere Cipher
DA.2.1 Represent data using multiple encoding schemes.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
DA.2.2 Collect data using computational tools and transform the data to make it more useful and reliable.
DA.2.3 Refine computational models based on the data they have generated.
AP.2.1 Use flowcharts and/or pseudocode to address complex problems as algorithms.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
AP.2.2 Create clearly named variables that represent different data types and perform operations on their values.
  1. 4.1 Programming Concepts
AP.2.3 Design and iteratively develop programs that combine control structures, including nested loops and compound conditionals. [
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.3 Comparison Operators
  4. 22.4 If Statements
  5. 22.7 For Loop Practice
AP.2.4 Decompose problems and subproblems into parts to facilitate the design, implementation, and review of programs. [
AP.2.5 Create procedures with parameters to organize code and make it easier to reuse
AP.2.6 Seek and incorporate feedback from team members and users to refine a solution that meets user needs.
AP.2.7 Incorporate existing code, media, and libraries into original programs and give attribution.
AP.2.8 Systematically test and refine programs using a range of test cases. [
  1. 4.3 Looping
  2. 4.4 Branching
AP.2.9 Distribute tasks and maintain a project timeline when collaboratively developing computational artifacts.
AP.2.10 Document programs in order to make them easier to follow, test, and debug
  1. 4.6 Organizational Techniques
IC.2.1 Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.
  1. 10.10 Impact of the Internet
IC.2.2 Discuss issues of bias and accessibility in the design of existing technologies.
  1. 10.1 Introduction to the Internet
  2. 10.10 Impact of the Internet
IC.2.3 Collaborate with many contributors through strategies such as crowdsourcing or surveys when creating a computational artifact.
IC.2.4 Describe tradeoffs between allowing information to be public and keeping information private and secure.
  1. 2.3 Internet Safety
  2. 2.4 Privacy & Security