9-12.CY.1 Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.
Clarifying Statement The emphasis is on identifying both personal information and organizational information, and devices and embedded systems, that an individual may have access to and that adversaries may want to compromise, obtain, or leverage.
Resources for teaching this standard:
9-12.CY.2 Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.
Clarifying Statement The emphasis is on considering the CIA Triad when recommending safeguards for a specific application or device.
Resources for teaching this standard:
11-12 ideas and examples for teaching this standard
11-12 lesson plans from SmartStart
9-12.CY.3 Explain specific trade-offs when selecting and implementing security recommendations.
Clarifying Statement The focus is on making security recommendations and discussing tradeoffs between the degree of confidentiality, the need for data integrity, the availability of information for legitimate use, and assurance that the information provided is genuine.
Resources for teaching this standard:
11-12 ideas and examples for teaching this standard
11-12 lesson plans from SmartStart
9-12.CY.4 Evaluate applications of cryptographic methods.
Clarifying Statement The focus is on analyzing the role that cryptography and data security play in events that have shaped history and impact the future.
Resources for teaching this standard:
9-12.CY.5 Recommend multiple actions to take prior and in response to various types of digital security breaches.
Clarifying Statement The emphasis is on analyzing different types of breaches and planning appropriate actions that might be taken to prevent and respond to a security breach.
Resources for teaching this standard:
11-12 ideas and examples for teaching this standard
11-12 lesson plans from SmartStart