Download as CSV
Unit 10 - Cybersecurity and Global Impacts
Lesson 1: Project - Innovation Simulation Part 1
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
CSP2021
CRD-1 - Incorporating multiple perspectives
CRD-1.A - Explain how computing innovations are improved through collaboration.
- CRD-1.A.1 - A computing innovation includes a program as an integral part of its function.
- CRD-1.A.2 - A computing innovation can be physical (e.g., self-driving car), non-physical computing software (e.g., picture editing software), or non-physical computing concepts (e.g., e-commerce).
CRD-1.C - Demonstrate effective interpersonal skills during collaboration.
- CRD-1.C.1 - Effective collaborative teams practice interpersonal skills, including but not limited to: ● communication ● consensus building ● conflict resolution ● negotiation
CRD-2 - Developers create and innovate using an iterative design process
CRD-2.A - Describe the purpose of a computing innovation.
- CRD-2.A.1 - The purpose of computing innovations is to solve problems or to pursue interests through creative expression.
IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.A - Explain how an effect of a computing innovation can be both beneficial and harmful.
- IOC-1.A.1 - People create computing innovations.
- IOC-1.A.2 - The way people complete tasks often changes to incorporate new computing innovations.
- IOC-1.A.5 - Advances in computing have generated and increased creativity in other fields, such as medicine, engineering, communications, and the arts.
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
- IOC-2.B.1 - Authentication measures protect devices and information from unauthorized access. Examples of authentication measures include strong passwords and multifactor authentication.
- IOC-2.B.10 - All real-world systems have errors or design flaws that can be exploited to compromise them. Regular software updates help fix errors that could compromise a computing system.
- IOC-2.B.2 - A strong password is something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
- IOC-2.B.3 - Multifactor authentication is a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categorie
- IOC-2.B.4 - Multifactor authentication requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
Lesson 2: Project - Innovation Simulation Part 2
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
Lesson 3: Data Policies and Privacy
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 2-IC-23 - Describe tradeoffs between allowing information to be public and keeping information private and secure.
- 3A-IC-29 - Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
- 3A-IC-30 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
CSP2021
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.A - Describe the risks to privacy from collecting and storing personal data on a computer system.
- IOC-2.A.1 - Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:● social security number● age● race● phone number(s)● medical infor
- IOC-2.A.12 - PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts.
- IOC-2.A.13 - Once information is placed online, it is difficult to delete.
- IOC-2.A.14 - Programs can collect your location and record where you have been, how you got there, and how long you were at a given location.
- IOC-2.A.15 - Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.
- IOC-2.A.2 - Search engines can record and maintain a history of searches made by users.
- IOC-2.A.3 - Websites can record and maintain a history of individuals who have viewed their pages.
- IOC-2.A.4 - Devices, websites, and networks can collect information about a user’s location.
- IOC-2.A.5 - Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions.
- IOC-2.A.6 - Search engines can use search history to suggest websites or for targeted marketing.
- IOC-2.A.7 - Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.
- IOC-2.A.8 - PII and other information placed online can be used to enhance a user’s online experiences.
- IOC-2.A.9 - PII stored online can be used to simplify making online purchases.
Lesson 4: The Value of Privacy
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 2-IC-23 - Describe tradeoffs between allowing information to be public and keeping information private and secure.
- 3A-IC-29 - Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
- 3A-IC-30 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
- 3B-IC-28 - Debate laws and regulations that impact the development and use of software.
CSP2021
IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.A - Explain how an effect of a computing innovation can be both beneficial and harmful.
- IOC-1.A.3 - Not every effect of a computing innovation is anticipated in advance.
IOC-1.B - Explain how a computing innovation can have an impact beyond its intended purpose.
- IOC-1.B.1 - Computing innovations can be used in ways that their creators had not originally intended:● The World Wide Web was originally intended only for rapid and easy exchange of information within the scientific community. ● Targeted advertising is
IOC-1.F - Explain how the use of computing could raise legal and ethical concerns.
- IOC-1.F.11 - Computing innovations can raise legal and ethical concerns. Some examples of these include:● the development of software that allows access to digital media downloads and streaming● the development of algorithms that include bias● th
- IOC-1.F.8 - As with any technology or medium, using computing to harm individuals or groups of people raises legal and ethical concerns.
- IOC-1.F.9 - Computing can play a role in social and political issues, which in turn often raise legal and ethical concerns.
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.A - Describe the risks to privacy from collecting and storing personal data on a computer system.
- IOC-2.A.1 - Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:● social security number● age● race● phone number(s)● medical infor
- IOC-2.A.10 - Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.
- IOC-2.A.11 - Information placed online can be used in ways that were not intended and that may have a harmful impact. For example, an email message may be forwarded, tweets can be retweeted, and social media posts can be viewed by potential employers.
- IOC-2.A.12 - PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts.
- IOC-2.A.15 - Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.
Lesson 5: Project - Innovation Simulation Part 3
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
CSP2021
IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.A - Explain how an effect of a computing innovation can be both beneficial and harmful.
- IOC-1.A.4 - A single effect can be viewed as both beneficial and harmful by different people, or even by the same person.
Lesson 6: Security Risks Part 1
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
NI - Networks & the Internet
- 3A-NI-05 - Give examples to illustrate how sensitive data can be affected by malware and other attacks.
CSP2021
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
- IOC-2.B.9 - Malware is software intended to damage a computing system or to take partial control over its operation.
IOC-2.C - Explain how unauthorized access to computing resources is gained.
- IOC-2.C.1 - Phishing is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
- IOC-2.C.2 - Keylogging is the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
- IOC-2.C.3 - Data sent over public networks can be intercepted, analyzed, and modified. One way that this can happen is through a rogue access point.
- IOC-2.C.4 - A rogue access point is a wireless access point that gives unauthorized access to secure networks.
- IOC-2.C.7 - Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.
Lesson 7: Security Risks Part 2
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
NI - Networks & the Internet
- 3A-NI-05 - Give examples to illustrate how sensitive data can be affected by malware and other attacks.
CSP2021
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
- IOC-2.B.7 - Computer virus and malware scanning software can help protect a computing system against infection.
- IOC-2.B.8 - A computer virus is a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.
IOC-2.C - Explain how unauthorized access to computing resources is gained.
- IOC-2.C.5 - A malicious link can be disguised on a web page or in an email message.
- IOC-2.C.6 - Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised.
Lesson 8: Project - Innovation Simulation Part 4
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
CSP2021
IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.B - Explain how a computing innovation can have an impact beyond its intended purpose.
- IOC-1.B.2 - Some of the ways computing innovations can be used may have a harmful impact on society, economy, or culture.
- IOC-1.B.3 - Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses.
- IOC-1.B.4 - It is not possible for a programmer to consider all the ways a computing innovation can be used.
- IOC-1.B.5 - Computing innovations have often had unintended beneficial effects by leading to advances in other fields.
- IOC-1.B.6 - Rapid sharing of a program or running a program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer.
Lesson 9: Protecting Data Part 1
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
NI - Networks & the Internet
- 3A-NI-06 - Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
- 3A-NI-07 - Compare various security measures, considering tradeoffs between the usability and security of a computer system.
- 3B-NI-04 - Compare ways software developers protect devices and information from unauthorized access.
CSP2021
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
- IOC-2.B.5 - Encryption is the process of encoding data to prevent unauthorized access. Decryption is the process of decoding the data. Two common encryption approaches are: ● Symmetric key encryption involves one key for both encryption and decryption.●
Lesson 10: Protecting Data Part 2
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
NI - Networks & the Internet
- 3A-NI-06 - Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
- 3A-NI-07 - Compare various security measures, considering tradeoffs between the usability and security of a computer system.
- 3B-NI-04 - Compare ways software developers protect devices and information from unauthorized access.
CSP2021
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
- IOC-2.B.1 - Authentication measures protect devices and information from unauthorized access. Examples of authentication measures include strong passwords and multifactor authentication.
- IOC-2.B.10 - All real-world systems have errors or design flaws that can be exploited to compromise them. Regular software updates help fix errors that could compromise a computing system.
- IOC-2.B.11 - Users can control the permissions programs have for collecting user information. Users should review the permission settings of programs to protect their privacy.
- IOC-2.B.2 - A strong password is something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
- IOC-2.B.3 - Multifactor authentication is a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categorie
- IOC-2.B.4 - Multifactor authentication requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
Lesson 11: Project - Innovation Simulation Part 5
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
Lesson 12: Project - Innovation Simulation Part 6
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.
Lesson 13: Project - Innovation Simulation Part 7
Standards Alignment
CSTA K-12 Computer Science Standards (2017)
IC - Impacts of Computing
- 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
- 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
- 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.