K-12 Computer Science Standards

Florida Computer and Network Security Fundamentals

170 Standards

1

19.01

Define cybersecurity.

2

19.02

Describe how information security evolved into cybersecurity and the impact of the Internet on the pace and nature of the evolution.

3

19.03

Describe the individual elements that comprise the CIA triad (i.e., Confidentiality, Integrity, Availability).

4

19.04

Define and explain the various types of hackers and the role each plays in cybersecurity.

5

19.05

Describe various methodologies used by hackers and the basis for their employment.

6

19.06

Describe the individual elements of the AAA model (Authentication, Authorization and Accounting).

7

20.01

Describe the role of the National Security Agency.

8

20.02

Describe current trends in cyberattacks and strategies for combating them.

9

20.03

Describe the legal implications of computer hacking and other forms of cyberattacks.

10

20.04

Understand the importance of the weekly bulletins distributed by the United States Computer Emergency Readiness Team (US-CERT).

11

20.05

Determine if any software or hardware on a given network has vulnerabilities outlined in the most recent US-CERT bulletin.

12

21.01

Differentiate between cybersecurity and information assurance.

13

21.02

Define confidentiality and give examples of security breaches.

14

21.03

Define integrity and give examples of security breaches.

15

21.04

Define authenticity and give examples of security breaches.

16

21.05

Define accountability (non-repudiation) and give examples of security breaches.

17

22.01

Describe the internal components of a computer (e.g., power supply, hard drive, mother board, I/O cards/ports, cabling).

18

22.02

Demonstrate and understanding of common computer and programming terminology.

19

22.03

Explain the physical and logical architecture of a microcomputer system.

20

22.04

Describe the file types used in the operation of a computer.

21

22.05

Compare and contrast memory technologies (e.g., RAM, ROM, virtual memory, memory management).

22

23.01

Compare operating system file naming conventions.

23

23.02

Describe the common elements that comprise the architecture of an operating system (e.g., kernel, file manager, memory manager, device manager, network manager).

24

23.03

Demonstrate proficiency with file management and structure (e.g., folder creation, file creation, backup, copy, delete, open, save).

25

23.04

Demonstrate a working knowledge of standard file formats.

26

23.05

Describe the purpose of various operating systems (e.g., Windows, Mac, iOS, Android and Linux).

27

23.06

Describe the difference between client and network operating systems.

28

23.07

Differentiate between different operating systems and applications and Macros.

29

23.08

Explain the basics of boot sequences, methods and startup utilities.

30

23.09

Compare and contrast open source and proprietary software.

31

23.10

Describe common system utilities used in performing computer maintenance.

32

24.01

Explain the interrelations of the seven layers of the Open Systems Interconnection (OSI) as it relates to hardware and software.

33

24.02

Describe the purpose of the OSI model and each of its layers.

34

24.03

Explain specific functions belonging to each OSI model layer.

35

24.04

Understand how two network nodes communicate through the OSI model.

36

24.05

Discuss the structure and purpose of data packets and frames.

37

24.06

Describe the two types of addressing covered by the OSI model.

38

25.01

Explain the interrelations of the four layers of the TCP/IP model as it relates to hardware and software.

39

25.02

Describe the purpose of the TCP/IP model and each of its layers.

40

25.03

Explain specific functions belonging to each TCP/IP model layer.

41

25.04

Understand how two network nodes communicate through the TCP/IP model.

42

25.05

Describe the two types of addressing covered by the TCP/IP model.

43

26.01

Describe the services and protocols used in the OSI Application Layer (i.e., DHCP, DNS, FTP, HTTP, SMTP, Telnet, IMAP).

44

26.02

Describe the services and protocols used in the OSI Transport Layer (i.e., TCP, TLS/SSL, UDP).

45

26.03

Describe the services and protocols used in the OSI Network Layer (i.e., IP, ICMP, IGMP, IPsec).

46

26.04

Describe the services and protocols used in the OSI Data Link Layer (i.e., ARP, OSPF, L2TP, PPP).

47

27.01

Define networking and describe the purpose of a network.

48

27.02

Describe the conceptual background of digital networks and cloud computing including terminology and basics.

49

27.03

Describe various types of networks and the advantages and disadvantages of each (e.g., peer to peer, client/server, server/thin client, ROI).

50

27.04

Describe the use, advantages, and disadvantages of various network media (e.g. coaxial, twisted pair, fiber optics).

51

27.05

Describe the function of various network devices (e.g., managed switch, switched hub or switch, router, bridge, gateway, access points, modem).

52

27.06

Describe how network devices are identified (i.e., IP addressing).

53

27.07

Explain the protocols commonly used in a network environment.

54

27.08

Differentiate between public and private IP addresses.

55

27.09

Describe the common ports and corresponding protocols used in a network.

56

27.10

Describe the difference between the Internet and intranet.

57

27.11

Compare and contrast IPv4 and IPv6.

58

27.12

Compare and contrast the different methods for network connectivity (e.g., broadband, wireless, Bluetooth, cellular).

59

27.13

Discuss the differences between Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Virtual Local Area Network (VLAN), and Virtual Private Network (VPN).

60

28.01

Describe the various types of cloud computing (IaaS, PaaS, SaaS) and modes of delivery (Public, Private, Community, Hybrid).

61

28.02

Describe practices that aid in protecting the Hybrid cloud model.

62

28.03

Describe the challenges and solutions associated with securing embedded devices.

63

29.01

Distinguish between vulnerability and a threat.

64

29.02

Discuss the different types of attacks (e.g., active, passive).

65

29.03

Define security policy and explain its role in cybersecurity.

66

29.04

Describe the basic methods of authentication (e.g., password, biometrics, smart cards. two-factor authentication, multifactor authentication).

67

29.05

Describe the various forms of encryption methodologies (e.g., symmetric, asymmetric, block cipher, stream cipher).

68

29.06

Describe hash functions and their role in authentication.

69

29.07

Describe various method of access control used in computer security (e.g., policies, groups, Access Control List (ACL)).

70

29.08

Understand the concept of malware (i.e., ransomware, worms, viruses, adware) and how attackers use it to steal sensitive or confidential information.

71

30.01

Define cybercrime and discuss the challenges facing law enforcement.

72

30.02

Identify the key legislative acts that impact cybersecurity.

73

30.03

Describe the Federal criminal code related to computers and give examples of cybercrimes and penalties, particularly those involving inappropriate access.

74

30.04

Discuss the concept of digital forensics and its place in cybercrime investigations and incident response.

75

30.05

Distinguish among the Intellectual Property Rights of trademark, patent, and copyright.

76

30.06

Explain digital rights management and the implications of the Digital Millennium Copyright Act (DMCA).

77

30.07

Describe the implications of various social media on the safeguarding of personal or sensitive information.

78

30.08

Describe various safeguards that can be employed to help ensure that sensitive or confidential information is not inadvertently divulged or obtained.

79

31.01

Define virtual computing.

80

31.02

Explain the benefits of virtual computing.

81

31.03

Differentiate between guest and host operating systems.

82

31.04

Install desktop virtualization software.

83

31.05

Describe the role of the hypervisor.

84

31.06

Create and upgrade a virtual machine.

85

31.07

Optimize the performance of a virtual machine.

86

31.08

Preserve the state of a virtual machine.

87

31.09

Clone, move and share virtual machines.

88

31.10

Use basic (static) and dynamic virtual disks and disk drives.

89

31.11

Configure a virtual network.

90

31.12

Connect devices to a virtual machine.

91

31.13

Enable security settings on a virtual machine.

92

32.01

Configure 802.1x authentication for a given scenario.

93

32.02

Connect clients to a VPN.

94

32.03

Understand Authentication, Authorization and Accounting (AAA) management.

95

32.04

Differentiate between TACACS+ (Terminal Access Controller Access Control System) and RADIUS.

96

32.05

Differentiate between Layer 2 Tunneling Protocol (L2TP) and Point-to-Point Tunneling Protocol (PPTP) protocols as they apply to VPN options.

97

32.06

Implement the use of SSH (Secure Shell).

98

32.07

Implement the use of IPsec (Internet Protocol Security).

99

32.08

Identify vulnerabilities associated with authentication.

100

32.09

Understand ways to implement VoIP technologies.

101

32.10

Demonstrate the use and purpose of Kerberos.

102

33.01

Configure access controls including biometric devices, keypads and security tokens.

103

33.02

Recognize social engineering attempts.

104

33.03

Evaluate environmental controls (e.g., EMI shielding, temperature, humidity and fire suppression).

105

33.04

Develop a method of training users to recognize, report, and avoid social engineering attempts.

106

33.05

Identify components of physical security, including mantraps, motion detection, alarm systems, locks, video surveillance, and fences/barricades.

107

33.06

Install a camera for a video surveillance system.

108

33.07

Configure an alarm system including a keypad and motion detector.

109

33.08

Recognize vulnerabilities associated with physical security.

110

33.09

Explain how a mantrap is used as a counter measure against tailgating.

111

34.01

Configure and maintain software and hardware firewalls.

112

34.02

Configure and secure routers.

113

34.03

Apply security settings to switches.

114

34.04

Configure and secure wireless devices.

115

34.05

Secure a LAN connected to a DSL/cable modem.

116

34.06

Configure a RAS (Remote Access Server) for remote connectivity.

117

34.07

Securely deploy a PBX (Private Branch Exchange).

118

34.08

Explain the benefits of implementing a VPN (Virtual Private Network).

119

34.09

Deploy IDS (intrusion detection system) and IPS (intrusion prevention systems).

120

34.1

Analyze the performance, efficiency and security of the network based on network monitoring and diagnostic software.

121

34.11

Employ techniques used to lock down workstations.

122

34.12

Configure and secure servers for a given scenario.

123

34.13

Understand and assess the security of mobile devices including but not limited to those using the Android, iOS and Windows platforms.

124

35.01

Explain the security implications of the Internet of Things (IoT) (i.e., understand the efforts to address authentication and updates to IoT devices).

125

35.02

Explain societal and security challenges associated with robotics.

126

35.03

Explain security challenges associated with serverless computing.

127

35.04

Explain societal and security challenges associated with the implementation of 5G.

128

35.05

Describe and explain the security challenges of Autonomous vehicles (i.e., the significance of vehicular cybersecurity and its relation to: computer vision, artificial intelligence, machine learning and deep learning).

129

36.01

Understand access control as it applies to MAC (Mandatory Access Control).

130

36.02

Understand access control as it applies to DAC (Discretionary Access Control).

131

36.03

Understand access control as it applies to RBAC (Role Based Access Control).

132

37.01

Understand and identify security concerns with the use of Coaxial Cable.

133

37.02

The student should be able to identify and understand security concerns for UTP/STP (Unshielded Twisted Pair / Shielded Twisted Pair).

134

37.03

Identify and understand security concerns fiber optic cable.

135

37.04

Identify security concerns associated with removable media.

136

37.05

Address pitfalls associated with tape backups.

137

37.06

Apply drive encryption to hard drives.

138

37.07

Secure flash drives.

139

37.08

Smartcards and secure USB memory.

140

38.01

Determine Security Zones.

141

38.02

Point out vulnerabilities on a DMZ (Demilitarized Zone).

142

38.03

Explain the security benefits of using an intranet.

143

38.04

Explain the security benefits of using an extranet.

144

38.05

Secure a VLAN (Virtual Local Area Network).

145

38.06

Describe the security benefits associated with NAT (Network Address Translation).

146

38.07

Justify the implementation of tunneling, for security purpose.

147

39.01

Select and employ appropriate communication concepts and strategies to enhance oral and written communication in the workplace.

148

39.02

Locate, organize and reference written information from various sources.

149

39.03

Design, develop and deliver formal and informal presentations using appropriate media to engage and inform diverse audiences.

150

39.04

Interpret verbal and nonverbal cues/behaviors that enhance communication.

151

39.05

Apply active listening skills to obtain and clarify information.

152

39.06

Develop and interpret tables and charts to support written and oral communications.

153

39.07

Exhibit public relations skills that aid in achieving customer satisfaction.

154

40.01

Employ critical thinking skills independently and in teams to solve problems and make decisions.

155

40.02

Employ critical thinking and interpersonal skills to resolve conflicts.

156

40.03

Identify and document workplace performance goals and monitor progress toward those goals.

157

40.04

Conduct technical research to gather information necessary for decision-making.

158

41.01

Use personal information management (PIM) applications to increase workplace efficiency.

159

41.02

Employ technological tools to expedite workflow including word processing, databases, reports, spreadsheets, multimedia presentations, electronic calendar, contacts, email, and internet applications.

160

41.03

Employ computer operations applications to access, create, manage, integrate, and store information.

161

41.04

Employ collaborative/groupware applications to facilitate group work.

162

42.01

Describe the nature and types of business organizations.

163

42.02

Explain the effect of key organizational systems on performance and quality.

164

42.03

List and describe quality control systems and/or practices common to the workplace.

165

42.04

Explain the impact of the global economy on business organizations.

166

43.01

Evaluate and justify decisions based on ethical reasoning.

167

43.02

Evaluate alternative responses to workplace situations based on personal, professional, ethical, legal responsibilities, and employer policies.

168

43.03

Identify and explain personal and long-term consequences of unethical or illegal behaviors in the workplace.

169

43.04

Interpret and explain written organizational policies and procedures.

170

43.05

Display proficiency in using team-oriented collaboration and video teleconferencing software (e.g. Teams, Zoom).

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program