CS Principles 2020-2021

Standards Alignment


Download as CSV

Unit 10 - Cybersecurity and Global Impacts

Lesson 1: Project - Innovation Simulation Part 1

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

CSP2021

CRD-1 - Incorporating multiple perspectives
CRD-1.A - Explain how computing innovations are improved through collaboration.
  • CRD-1.A.1 - A computing innovation includes a program as an integral part of its function.
  • CRD-1.A.2 - A computing innovation can be physical (e.g., self-driving car), non-physical computing software (e.g., picture editing software), or non-physical computing concepts (e.g., e-commerce).
CRD-1.C - Demonstrate effective interpersonal skills during collaboration.
  • CRD-1.C.1 - Effective collaborative teams practice interpersonal skills, including but not limited to: ●       communication ●       consensus building ●       conflict resolution ●       negotiation
CRD-2 - Developers create and innovate using an iterative design process
CRD-2.A - Describe the purpose of a computing innovation.
  • CRD-2.A.1 - The purpose of computing innovations is to solve problems or to pursue interests through creative expression.
IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.A - Explain how an effect of a computing innovation can be both beneficial and harmful.
  • IOC-1.A.1 - People create computing innovations.
  • IOC-1.A.2 - The way people complete tasks often changes to incorporate new computing innovations.
  • IOC-1.A.5 - Advances in computing have generated and increased creativity in other fields, such as medicine, engineering, communications, and the arts.
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
  • IOC-2.B.1 - Authentication measures protect devices and information from unauthorized access. Examples of authentication measures include strong passwords and multifactor authentication.
  • IOC-2.B.10 - All real-world systems have errors or design flaws that can be exploited to compromise them. Regular software updates help fix errors that could compromise a computing system.
  • IOC-2.B.2 - A strong password is something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
  • IOC-2.B.3 - Multifactor authentication is a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categorie
  • IOC-2.B.4 - Multifactor authentication requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.

Lesson 2: Project - Innovation Simulation Part 2

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

Lesson 3: Data Policies and Privacy

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 2-IC-23 - Describe tradeoffs between allowing information to be public and keeping information private and secure.
  • 3A-IC-29 - Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  • 3A-IC-30 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.

CSP2021

IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.A - Describe the risks to privacy from collecting and storing personal data on a computer system.
  • IOC-2.A.1 - Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:●       social security number●       age●       race●       phone number(s)●       medical infor
  • IOC-2.A.12 - PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts.
  • IOC-2.A.13 - Once information is placed online, it is difficult to delete.
  • IOC-2.A.14 - Programs can collect your location and record where you have been, how you got there, and how long you were at a given location.
  • IOC-2.A.15 - Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.
  • IOC-2.A.2 - Search engines can record and maintain a history of searches made by users.
  • IOC-2.A.3 - Websites can record and maintain a history of individuals who have viewed their pages.
  • IOC-2.A.4 - Devices, websites, and networks can collect information about a user’s location.
  • IOC-2.A.5 - Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions.
  • IOC-2.A.6 - Search engines can use search history to suggest websites or for targeted marketing.
  • IOC-2.A.7 - Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.
  • IOC-2.A.8 - PII and other information placed online can be used to enhance a user’s online experiences.
  • IOC-2.A.9 - PII stored online can be used to simplify making online purchases.

Lesson 4: The Value of Privacy

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 2-IC-23 - Describe tradeoffs between allowing information to be public and keeping information private and secure.
  • 3A-IC-29 - Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  • 3A-IC-30 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  • 3B-IC-28 - Debate laws and regulations that impact the development and use of software.

CSP2021

IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.A - Explain how an effect of a computing innovation can be both beneficial and harmful.
  • IOC-1.A.3 - Not every effect of a computing innovation is anticipated in advance.
IOC-1.B - Explain how a computing innovation can have an impact beyond its intended purpose.
  • IOC-1.B.1 - Computing innovations can be used in ways that their creators had not originally intended:●       The World Wide Web was originally intended only for rapid and easy exchange of information within the scientific community. ●       Targeted advertising is
IOC-1.F - Explain how the use of computing could raise legal and ethical concerns.
  • IOC-1.F.11 - Computing innovations can raise legal and ethical concerns. Some examples of these include:●       the development of software that allows access to digital media downloads and streaming●       the development of algorithms that include bias●       th
  • IOC-1.F.8 - As with any technology or medium, using computing to harm individuals or groups of people raises legal and ethical concerns.
  • IOC-1.F.9 - Computing can play a role in social and political issues, which in turn often raise legal and ethical concerns.
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.A - Describe the risks to privacy from collecting and storing personal data on a computer system.
  • IOC-2.A.1 - Personally identifiable information (PII) is information about an individual that identifies, links, relates, or describes them. Examples of PII include:●       social security number●       age●       race●       phone number(s)●       medical infor
  • IOC-2.A.10 - Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.
  • IOC-2.A.11 - Information placed online can be used in ways that were not intended and that may have a harmful impact. For example, an email message may be forwarded, tweets can be retweeted, and social media posts can be viewed by potential employers.
  • IOC-2.A.12 - PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts.
  • IOC-2.A.15 - Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.

Lesson 5: Project - Innovation Simulation Part 3

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

CSP2021

IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.A - Explain how an effect of a computing innovation can be both beneficial and harmful.
  • IOC-1.A.4 - A single effect can be viewed as both beneficial and harmful by different people, or even by the same person.

Lesson 6: Security Risks Part 1

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 3A-NI-05 - Give examples to illustrate how sensitive data can be affected by malware and other attacks.

CSP2021

IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
  • IOC-2.B.9 - Malware is software intended to damage a computing system or to take partial control over its operation.
IOC-2.C - Explain how unauthorized access to computing resources is gained.
  • IOC-2.C.1 - Phishing is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
  • IOC-2.C.2 - Keylogging is the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
  • IOC-2.C.3 - Data sent over public networks can be intercepted, analyzed, and modified. One way that this can happen is through a rogue access point.
  • IOC-2.C.4 - A rogue access point is a wireless access point that gives unauthorized access to secure networks.
  • IOC-2.C.7 - Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.

Lesson 7: Security Risks Part 2

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 3A-NI-05 - Give examples to illustrate how sensitive data can be affected by malware and other attacks.

CSP2021

IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
  • IOC-2.B.7 - Computer virus and malware scanning software can help protect a computing system against infection.
  • IOC-2.B.8 - A computer virus is a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.
IOC-2.C - Explain how unauthorized access to computing resources is gained.
  • IOC-2.C.5 - A malicious link can be disguised on a web page or in an email message.
  • IOC-2.C.6 - Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised.

Lesson 8: Project - Innovation Simulation Part 4

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

CSP2021

IOC-1 - While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences
IOC-1.B - Explain how a computing innovation can have an impact beyond its intended purpose.
  • IOC-1.B.2 - Some of the ways computing innovations can be used may have a harmful impact on society, economy, or culture.
  • IOC-1.B.3 - Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses.
  • IOC-1.B.4 - It is not possible for a programmer to consider all the ways a computing innovation can be used.
  • IOC-1.B.5 - Computing innovations have often had unintended beneficial effects by leading to advances in other fields.
  • IOC-1.B.6 - Rapid sharing of a program or running a program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer.

Lesson 9: Protecting Data Part 1

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 3A-NI-06 - Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  • 3A-NI-07 - Compare various security measures, considering tradeoffs between the usability and security of a computer system.
  • 3B-NI-04 - Compare ways software developers protect devices and information from unauthorized access.

CSP2021

IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
  • IOC-2.B.5 - Encryption is the process of encoding data to prevent unauthorized access. Decryption is the process of decoding the data. Two common encryption approaches are: ●       Symmetric key encryption involves one key for both encryption and decryption.●      

Lesson 10: Protecting Data Part 2

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

NI - Networks & the Internet
  • 3A-NI-06 - Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  • 3A-NI-07 - Compare various security measures, considering tradeoffs between the usability and security of a computer system.
  • 3B-NI-04 - Compare ways software developers protect devices and information from unauthorized access.

CSP2021

IOC-2 - The use of computing innovations may involve risks to your personal safety and identity
IOC-2.B - Explain how computing resources can be protected and can be misused.
  • IOC-2.B.1 - Authentication measures protect devices and information from unauthorized access. Examples of authentication measures include strong passwords and multifactor authentication.
  • IOC-2.B.10 - All real-world systems have errors or design flaws that can be exploited to compromise them. Regular software updates help fix errors that could compromise a computing system.
  • IOC-2.B.11 - Users can control the permissions programs have for collecting user information. Users should review the permission settings of programs to protect their privacy.
  • IOC-2.B.2 - A strong password is something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
  • IOC-2.B.3 - Multifactor authentication is a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categorie
  • IOC-2.B.4 - Multifactor authentication requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.

Lesson 11: Project - Innovation Simulation Part 5

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

Lesson 12: Project - Innovation Simulation Part 6

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

Lesson 13: Project - Innovation Simulation Part 7

Standards Alignment

CSTA K-12 Computer Science Standards (2017)

IC - Impacts of Computing
  • 3A-IC-24 - Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.
  • 3A-IC-27 - Use tools and methods for collaboration on a project to increase connectivity of people in different cultures and career fields.
  • 3B-IC-25 - Evaluate computational artifacts to maximize their beneficial effects and minimize harmful effects on society.

Lesson 14: Assessment Day