Standard 1 : Explain the physical security of devices.



This document was generated on CPALMS - www.cpalms.org


General Information

Number: SC.8.CS.1
Title: Explain the physical security of devices.
Type: Standard
Subject: Computer Science (Starting 2025-2026)
Grade: 8
Strand: Cyber Security

Related Benchmarks

This cluster includes the following benchmarks
Code Description
SC.8.CS.1.1: Analyze threats and vulnerabilities to information security for individuals and organizations.
Clarifications:
Clarification 1: Threats and vulnerabilities such as malware, phishing, smishing and hacks.
SC.8.CS.1.2: Explain how authentication and authorization methods can protect users.
Clarifications:
Clarification 1: Students should examine more advanced authentication and authorization methods, such as two-factor, multifactor and biometric.
SC.8.CS.1.3: Describe defense in-depth strategies to protect simple networks.
Clarifications:
Clarification 1: Instruction includes layered strategies, such as firewalls, allow and block lists, changes to default passwords and access points.
SC.8.CS.1.4: Explain how malicious actions threaten network security.
Clarifications:
Clarification 1: Instruction includes malicious actions, such as social engineering, malware and hacks.
SC.8.CS.1.5: Explain how malicious actions threaten physical security.
SC.8.CS.1.6: Describe defense in depth and how physical access controls work together.
Clarifications:
Clarification 1: Instruction includes authentic and digital physical access controls, such as door locks, ID cards, PIN codes, bollards, lighting, fencing, cameras and guards.
SC.8.CS.1.7: Explore the process of protecting computer hardware from exploitation.
Clarifications:

Clarification 1: Instruction includes disabled or unused USB ports, windows lock screens and managed access to restricted areas.

Clarification 2: Instruction includes hardware, tablets, phones and other devices.