Code |
Description |
SC.8.CS.1.1: | Analyze threats and vulnerabilities to information security for individuals and organizations.Clarifications: Clarification 1: Threats and vulnerabilities such as malware, phishing, smishing and hacks. |
|
SC.8.CS.1.2: | Explain how authentication and authorization methods can protect users.Clarifications: Clarification 1: Students should examine more advanced authentication and authorization methods, such as two-factor, multifactor and biometric. |
|
SC.8.CS.1.3: | Describe defense in-depth strategies to protect simple networks.Clarifications: Clarification 1: Instruction includes layered strategies, such as firewalls, allow and block lists, changes to default passwords and access points. |
|
SC.8.CS.1.4: | Explain how malicious actions threaten network security.Clarifications: Clarification 1: Instruction includes malicious actions, such as social engineering, malware and hacks. |
|
SC.8.CS.1.5: | Explain how malicious actions threaten physical security. |
SC.8.CS.1.6: | Describe defense in depth and how physical access controls work together.Clarifications: Clarification 1: Instruction includes authentic and digital physical access controls, such as door locks, ID cards, PIN codes, bollards, lighting, fencing, cameras and guards. |
|
SC.8.CS.1.7: | Explore the process of protecting computer hardware from exploitation.Clarifications:
Clarification 1: Instruction includes disabled or unused USB ports, windows lock screens and managed access to restricted areas. Clarification 2: Instruction includes hardware, tablets, phones and other devices. |
|