Please enable JavaScript to use CodeHS

North Carolina Intro to CS Standards Mapping

to

Fundamentals of Cybersecurity

35 Standards in this Framework 26 Standards Mapped 74% Mapped to Course


Standard Lessons
ICS-CS-01 Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
  1. 4.1 Programming Concepts
  2. 7.1 Operating Systems
  3. 8.1 Inside Web Apps
  4. 10.2 Notational Systems
ICS-CS-02 Compare levels of abstraction and interactions between application software, system software, and hardware layers.
  1. 4.1 Programming Concepts
  2. 7.1 Operating Systems
  3. 8.1 Inside Web Apps
  4. 10.2 Notational Systems
ICS-CS-03 Explain the roles of operating systems including memory management, data storage/retrieval, process management, and access control.
  1. 7.1 Operating Systems
  2. 11.4 Storage Options
ICS-CS-04 Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
  1. 12.1 Methodology
  2. 12.2 Support Practice
ICS-NI-01 Evaluate the relationship between routers, switches, servers, and topology with regard to networks.
  1. 11.3 Network Devices
  2. 11.5 Network Options
  3. 11.6 Network Communication
  4. 11.7 Network Management
ICS-NI-02 Identify examples to illustrate how sensitive data can be affected by malware and other attacks.
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
ICS-NI-03 Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  1. 1.3 Impact of Cybersecurity
  2. 2.4 Privacy & Security
  3. 7.6 Application Security
  4. 8.9 Common Security Problems
ICS-NI-04 Compare various security measures and consider tradeoffs between the usability and security of a computing system.
  1. 1.4 The CIA Triad
  2. 7.6 Application Security
  3. 7.7 Browser Configuration
ICS-DA-01 Compare different binary representations of data, including text, sound, images, and numbers.
  1. 10.2 Notational Systems
ICS-DA-02 Evaluate the tradeoffs in how data elements are organized and where data is stored.
  1. 8.3 The Value of Data
  2. 8.4 Databases
  3. 10.2 Notational Systems
  4. 10.3 Data Representation
ICS-DA-03 Create interactive data visualizations using software tools to help others better understand real-world phenomena.
  1. 8.3 The Value of Data
ICS-DA-04 Create computational models that represent the relationships among different elements of data collected.
  1. 8.3 The Value of Data
ICS-AP-01 Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
ICS-AP-02 Explain the use of artificial intelligence within computing systems.
  1. 10.10 Impact of the Internet
ICS-AP-03 Utilize lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
  1. 4.1 Programming Concepts
  2. 4.5 Arrays and Objects
ICS-AP-04 Justify the selection of specific control structures, considering implementation, readability, and program performance.
  1. 4.3 Looping
  2. 4.4 Branching
ICS-AP-05 Iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
  1. 3.1 Project: Public Service Announcement
  2. 6.1 Project: Classic Cipher Newscast
ICS-AP-06 Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
  1. 4.6 Organizational Techniques
ICS-AP-07 Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
ICS-AP-08 Systematically design programs for broad audiences.
ICS-AP-09 Refine programs by incorporating feedback from users.
ICS-AP-10 Evaluate licenses that limit or restrict use of computational artifacts when using resources such as software libraries.
  1. 2.6 Creative Credit & Copyright
  2. 7.5 Software Licenses
ICS-AP-11 Evaluate computational artifacts for usability.
  1. 2.5 Information Literacy
  2. 2.6 Creative Credit & Copyright
  3. 8.3 The Value of Data
ICS-AP-12 Modify computational artifacts to increase usability and accessibility.
ICS-AP-13 Develop computational artifacts working in team roles using collaborative tools.
ICS-AP-14 Explain design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs.
ICS-IC-01 Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  1. 1.3 Impact of Cybersecurity
  2. 10.10 Impact of the Internet
ICS-IC-02 Elaborate how computational innovations have and may continue to impact society.
  1. 10.10 Impact of the Internet
ICS-IC-03 Evaluate how equity, access, and influence impact distribution of computing resources in a global society.
  1. 10.10 Impact of the Internet
ICS-IC-04 Test computational artifacts to reduce bias and equity deficits.
ICS-IC-05 Demonstrate ways a given algorithm applies to problems across disciplines.
ICS-IC-06 Utilize tools and methods for collaboration on a project to increase connectivity of peers.
ICS-IC-07 Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  1. 2.6 Creative Credit & Copyright
ICS-IC-08 Explain privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  1. 2.4 Privacy & Security
  2. 2.6 Creative Credit & Copyright
  3. 8.3 The Value of Data
ICS-IC-09 Evaluate the social and economic implications of privacy in the context of safety, law, and ethics.
  1. 2.4 Privacy & Security
  2. 2.7 Hacking Ethics