K-12 Computer Science Standards

South Dakota Cybersecurity

22 Standards

1

SD.CYB.1.1

Define the importance of the cybersecurity industry.

2

SD.CYB.1.2

Identify the role cybersecurity plays in personal usage.

3

SD.CYB.1.3

Identify the role cybersecurity plays in industry usage.

4

SD.CYB.2.1

Investigate the Confidentiality Integrity Availability (CIA) Triad – Security Models.

5

SD.CYB.2.2

Compare and contrast usability and security.

6

SD.CYB.3.1

Investigate encryption and encryption types.

7

SD.CYB.3.2

Investigate how businesses utilize security systems.

8

SD.CYB.3.3

Compare and contrast public versus private Wi-Fi.

9

SD.CYB.3.4

Explore processes that maintain integrity of data.

10

SD.CYB.3.5

Investigate data breaches and its impact on business and customers.

11

SD.CYB.4.1

Differentiate between threats, vulnerabilities, and attacks.

12

SD.CYB.4.2

Utilize adversarial thinking.

13

SD.CYB.4.3

Describe common security related software vulnerabilities.

14

SD.CYB.4.4

Explore social engineering techniques related to cybersecurity.

15

SD.CYB.5.1

Compare and contrast ethical versus non-ethical hacking.

16

SD.CYB.5.2

Understand confidentiality and the role it plays in cybersecurity.

17

SD.CYB.5.3

Discuss the impact of unethical and illegal hacking on quality of life.

18

SD.CYB.5.4

Evaluate how the role of value and ethics impacts laws and policy decisions.

19

SD.CYB.5.5

Evaluate proprietary information and protections.

20

SD.CYB.6.1

Identify personal interests and abilities related to cybersecurity careers.

21

SD.CYB.6.2

Investigate career opportunities, trends, and requirements related to cybersecurity careers.

22

SD.CYB.6.3

Identify skills needed for cybersecurity careers.

Ready to Start Learning?

Explore our courses aligned with these standards

View School Program