Please enable JavaScript to use CodeHS

West Virginia Computer Science and Mathematics Standards Mapping


Fundamentals of Cybersecurity

44 Standards in this Framework 25 Standards Mapped 56% Mapped to Course

Standard Lessons
CS.M.1 Analyze the various mathematical bases (e.g., binary, decimal, hexadecimal) and convert between them.
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
CS.M.2 Describe the relationship between binary and hexadecimal representations.
  1. 10.3 Data Representation
CS.M.3 Convert information between various encoding formats (e.g., ASCII, Unicode, hexadecimal, binary).
  1. 10.2 Notational Systems
  2. 10.3 Data Representation
CS.M.4 Compare techniques (e.g., sorting, statistics, searching) for analyzing massive data collections.
CS.M.5 Describe how mathematical and statistical functions, sets, and logic are used in computation.
  1. 22.2 Logical Operators
  2. 22.3 Comparison Operators
CS.M.6 Utilize predefined mathematical functions and parameters to divide a complex problem into simpler parts, including parallel processing.
CS.M.7 Interpret truth tables from basic statements using Boolean operators (AND, OR, XOR, and NOT).
  1. 22.1 Booleans
  2. 22.3 Comparison Operators
CS.M.8 Explain ways in which sequence, selection, iteration, and recursion are building blocks of algorithms.
  1. 4.3 Looping
  2. 4.4 Branching
  3. 22.6 General For Loops
  4. 22.9 While Loops
CS.M.9 Create systems of equations based on real-world situations.
CS.M.10 Analyze decisions and strategies using probability and statistical concepts.
CS.M.11 Utilize modeling and simulation techniques to represent and understand natural phenomena.
CS.M.12 Examine classical algorithms (e.g., searching, sorting, and shortest path).
CS.M.13 Manipulate formulas and equations and apply them to algorithm development.
CS.M.14 Apply algorithm analysis and design techniques to solve problems.
CS.M.15 Write algorithms to solve mathematical problems using formulas, equations, and functions.
CS.M.16 Implement conditional statements that include if/then, if/then/else, case statements, and Boolean logic, in the design of algorithms.
  1. 4.4 Branching
  2. 22.1 Booleans
  3. 22.2 Logical Operators
  4. 22.3 Comparison Operators
  5. 22.4 If Statements
CS.M.17 Represent algorithms using flowcharts and pseudocode.
  1. 4.3 Looping
  2. 4.6 Organizational Techniques
CS.M.18 Combine standard function types using arithmetic operations.
CS.M.19 Analyze algorithms for correctness, clarity, and efficiency.
CS.M.20 Compare and contrast computer programming languages and paradigms (e.g., compiled and interpreted languages, procedural and object-oriented paradigms).
  1. 4.1 Programming Concepts
CS.M.21 Diagram the program execution process.
CS.M.22 Determine the output of a given sample program without the use of a computer.
CS.M.23 Implement computing applications using the following software development tools and techniques: -branching (if, if-else), -declare, define, and reference variables, -lists/arrays, -looping (for, while, do/while), -recursion, -sequencing
  1. 4.3 Looping
  2. 4.4 Branching
  3. 4.5 Arrays and Objects
  4. 22.4 If Statements
  5. 22.5 For Loops in JavaScript
  6. 22.9 While Loops
CS.M.24 Use various debugging and testing methods to ensure program correctness.
CS.M.25 Cite evidence to support or refute the correctness of software solutions.
CS.M.26 Recognize that computers are devices that execute programs.
  1. 4.1 Programming Concepts
CS.M.27 Identify a variety of electronic devices (e.g., cell phones, desktops, laptops, vehicles, programmable thermostats, and programmable kitchen appliances) that contain computational processors.
  1. 1.2 What is Cybersecurity?
  2. 7.1 Operating Systems
CS.M.28 Describe unique features of computers embedded in mobile devices and vehicles.
CS.M.29 Investigate the history of computers, identifying contributors and major milestones (e.g., Alan Turing, Charles Babbage, Ada Lovelace, Grace Hopper, analytical machine, ENIAC, IBM PC).
CS.M.30 Demonstrate an understanding of the relationship between hardware and software.
  1. 7.1 Operating Systems
  2. 10.2 Notational Systems
  3. 11.1 Internal Components
  4. 11.2 Peripheral Devices
CS.M.31 Develop criteria for purchasing or upgrading computer system hardware.
CS.M.32 Describe primary components of computer systems (e.g., input, output, processing, and storage).
  1. 11.1 Internal Components
  2. 11.2 Peripheral Devices
CS.M.33 Explain multiple levels of hardware and software that support program execution (e.g., compilers, interpreters, operating systems, networks).
  1. 7.1 Operating Systems
  2. 7.4 Software and Applications
  3. 11.3 Network Devices
CS.M.34 Apply strategies for identifying and solving routine hardware problems that occur during everyday computer use.
  1. 11.2 Peripheral Devices
  2. 11.3 Network Devices
  3. 12.1 Methodology
  4. 12.2 Support Practice
CS.M.35 Describe how the Internet facilitates global communication.
  1. 10.10 Impact of the Internet
CS.M.36 Describe issues that impact network functionality (e.g., latency, bandwidth, firewalls, server capability).
  1. 10.4 Internet Hardware and Sending Information
  2. 11.6 Network Communication
CS.M.37 Summarize appropriate and inappropriate technological behaviors, including issues of privacy, copyright, security, legalities, and politics.
  1. 2.2 Cyberbullying
  2. 2.3 Internet Safety
  3. 2.4 Privacy & Security
  4. 2.6 Creative Credit & Copyright
  5. 2.7 Hacking Ethics
  6. 7.5 Software Licenses
CS.M.38 Explore the ramifications of inappropriate uses of technology.
  1. 2.2 Cyberbullying
  2. 2.6 Creative Credit & Copyright
  3. 2.7 Hacking Ethics
  4. 7.5 Software Licenses
CS.M.39 Investigate the national and global economic impact of cybercrime.
  1. 1.2 What is Cybersecurity?
  2. 1.3 Impact of Cybersecurity
CS.M.40 Discuss accessibility issues (e.g., adaptive technology for special needs individuals, censorship, geographical locations, and economically-disadvantaged populations).
CS.M.41 Compare the reliability of various online sources.
  1. 2.5 Information Literacy
CS.M.42 Investigate information ownership topics: -access, -distribution rights, -hacking, -licensure, -open source, -public domain, -software privacy
  1. 2.6 Creative Credit & Copyright
  2. 2.7 Hacking Ethics
  3. 7.5 Software Licenses
CS.M.43 Describe security and privacy issues that relate to computer networks.
  1. 2.4 Privacy & Security
  2. 8.9 Common Security Problems
  3. 11.6 Network Communication
  4. 11.7 Network Management
CS.M.44 Explain principles of network security and techniques that protect stored and transmitted data (e.g., encryption, cryptography, and authentication).
  1. 5.1 Cryptography, Cryptology, Cryptanalysis