7-8.CY.1 Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
Clarifying Statement The emphasis is on identifying personal information and devices that an individual may have access to and that adversaries may want to obtain or compromise. At this stage, students should focus on specific data and devices that they have access to. Safeguards
Resources for teaching this standard:
7-8.CY.2 Describe physical, digital, and behavioral safeguards that can be employed in different situations.
Clarifying Statement The emphasis is on recommending different types of security measures including physical, digital, and behavioral, for a given situation.
Resources for teaching this standard:
7-8.CY.3 Describe trade-offs of implementing specific security safeguards.
Clarifying Statement The focus is on thinking about how a specific safeguard impacts the confidentiality, integrity, and access of information. Additionally, there should be a focus on discussing whether strengthening one specific safeguard adversely affects another.
Resources for teaching this standard:
7-8.CY.4 Describe the limitations of cryptographic methods.
Clarifying Statement The focus is on recognizing that cryptography provides a level of security for data, and some types of encryption are weaker than others.
Resources for teaching this standard:
7-8.CY.5 Describe actions to be taken before and after an application or device reports a security problem or performs unexpectedly.
Clarifying Statement The emphasis is on explaining appropriate actions to prevent and address common security issues for common situations.
Resources for teaching this standard: