for North Carolina Intro to CS — Fundamentals of Cybersecurity (2020)
Total Standards: 35Mapped: 26Completion: 74%
ICS-CS-01
Explain how abstractions hide the underlying implementation details of computing systems embedded in everyday objects.
4.1 Programming Concepts
7.1 Operating Systems
8.1 Inside Web Apps
9.2 Notational Systems
ICS-CS-02
Compare levels of abstraction and interactions between application software, system software, and hardware layers.
4.1 Programming Concepts
7.1 Operating Systems
8.1 Inside Web Apps
9.2 Notational Systems
ICS-CS-03
Explain the roles of operating systems including memory management, data storage/retrieval, process management, and access control.
7.1 Operating Systems
10.4 Storage Options
ICS-CS-04
Develop guidelines that convey systematic troubleshooting strategies that others can use to identify and fix errors.
11.1 Methodology
11.2 Support Practice
ICS-NI-01
Evaluate the relationship between routers, switches, servers, and topology with regard to networks.
10.3 Network Devices
10.5 Network Options
10.6 Network Communication
10.7 Network Management
ICS-NI-02
Identify examples to illustrate how sensitive data can be affected by malware and other attacks.
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
ICS-NI-03
Recommend cybersecurity measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.6 Application Security
8.9 Common Security Problems
ICS-NI-04
Compare various security measures and consider tradeoffs between the usability and security of a computing system.
1.4 The CIA Triad
7.6 Application Security
7.7 Browser Configuration
ICS-DA-01
Compare different binary representations of data, including text, sound, images, and numbers.
9.2 Notational Systems
ICS-DA-02
Evaluate the tradeoffs in how data elements are organized and where data is stored.
8.3 The Value of Data
8.4 Databases
9.2 Notational Systems
9.3 Data Representation
ICS-DA-03
Create interactive data visualizations using software tools to help others better understand real-world phenomena.
8.3 The Value of Data
ICS-DA-04
Create computational models that represent the relationships among different elements of data collected.
8.3 The Value of Data
ICS-AP-01
Create prototypes that use algorithms to solve computational problems by leveraging prior student knowledge and personal interests.
4.3 Looping
4.6 Organizational Techniques
ICS-AP-02
Explain the use of artificial intelligence within computing systems.
9.10 Impact of the Internet
ICS-AP-03
Utilize lists to simplify solutions, generalizing computational problems instead of repeatedly using simple variables.
4.1 Programming Concepts
4.5 Arrays and Objects
ICS-AP-04
Justify the selection of specific control structures, considering implementation, readability, and program performance.
4.3 Looping
4.4 Branching
ICS-AP-05
Iteratively develop computational artifacts for practical intent, personal expression, or to address a societal issue by using events to initiate instructions.
3.1 Project: Public Service Announcement
6.1 Project: Classic Cipher Newscast
ICS-AP-06
Decompose problems into smaller components through systematic analysis, using constructs such as procedures, modules, and/or objects.
4.6 Organizational Techniques
ICS-AP-07
Create artifacts by using procedures within a program, combinations of data and procedures, or independent but interrelated programs.
ICS-AP-08
Systematically design programs for broad audiences.
ICS-AP-09
Refine programs by incorporating feedback from users.
ICS-AP-10
Evaluate licenses that limit or restrict use of computational artifacts when using resources such as software libraries.
2.6 Creative Credit & Copyright
7.5 Software Licenses
ICS-AP-11
Evaluate computational artifacts for usability.
2.5 Information Literacy
2.6 Creative Credit & Copyright
8.3 The Value of Data
ICS-AP-12
Modify computational artifacts to increase usability and accessibility.
ICS-AP-13
Develop computational artifacts working in team roles using collaborative tools.
ICS-AP-14
Explain design decisions using text, graphics, presentations, and/or demonstrations in the development of complex programs.
ICS-IC-01
Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
1.3 Impact of Cybersecurity
9.10 Impact of the Internet
ICS-IC-02
Elaborate how computational innovations have and may continue to impact society.
9.10 Impact of the Internet
ICS-IC-03
Evaluate how equity, access, and influence impact distribution of computing resources in a global society.
9.10 Impact of the Internet
ICS-IC-04
Test computational artifacts to reduce bias and equity deficits.
ICS-IC-05
Demonstrate ways a given algorithm applies to problems across disciplines.
ICS-IC-06
Utilize tools and methods for collaboration on a project to increase connectivity of peers.
ICS-IC-07
Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
2.6 Creative Credit & Copyright
ICS-IC-08
Explain privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
2.4 Privacy & Security
2.6 Creative Credit & Copyright
8.3 The Value of Data
ICS-IC-09
Evaluate the social and economic implications of privacy in the context of safety, law, and ethics.