BPS District Computer Science and Cybersecurity Standards Book
Completion requirements
Concepts
(DC)
Computer Science and Cybersecurity
Digital Citizenship
Sub-Concepts
(SE) Safety & Ethics - There are both positive and negative impacts in social and ethical behaviors for using technology.
(RU) Responsible Use - Respect and dignity in virtual communities.
(DI) Digital Identity - Responsibilities and opportunities of living, learning and working in an interconnected digital world.
- CSC-00.DC_SE.1 With guidance, use technology in safe and correct ways. (CYSEC)
- CSC-00.DC_SE.2 With guidance, use authentication methods to access technology. (CYSEC)
- CSC-00.DC_RU.1 Discuss positive and negative behaviors when using electronic communication. (CYSEC)
- CSC-00.DC_RU.2 With guidance, identify appropriate manners while participating in an online community.
- CSC-00.DC_RU.4 Comply with Acceptable Use Policies.
- none
- CSC-01.DC_SE.1 Identify how to use technology in safe and correct ways. (CYSEC)
- CSC-01.DC_SE.2 Understand the differences between a username and authentication methods and independently use them to access technology. (CYSEC)
- CSC-01.DC_RU.1 Identify positive and negative behaviors when using electronic communication. (CYSEC)
- CSC-01.DC_RU.2 Discuss reporting inappropriate electronic content. (CYSEC)
- CSC-01.DC_RU.4 Comply with Acceptable Use Policies.
- CSC-01.DC_DI.1 Recognize that you have a digital identity.
- CSC-02.DC_SE.1 Explain how to use technology in safe and correct ways. (CYSEC)
- CSC-02.DC_SE.2 Identify strategies for protecting authentication methods. (CYSEC)
- CSC-02.DC_SE.3 Recognize the risks of interacting online with others. (CYSEC)
- CSC-02.DC_RU.1 Explain positive and negative behaviors when using electronic communication. (CYSEC)
- CSC-02.DC_RU.2 Know and identify how to report concerns regarding online content and behaviors. (CYSEC)
- CSC-02.DC_RU.3 Develop a code of conduct, explain, and practice appropriate behavior and responsibilities while participating in an online community.
- CSC-02.DC_RU.4 Comply with Acceptable Use Policies.
- CSC-02.DC_DI.1 Define digital identity.
- CSC-03.DC_SE.1 Identify problems that relate to inappropriate use of computing devices and networks. (CYSEC)
- CSC-03.DC_SE.2 Keep authentication methods confidential and be proactive if they are compromised. (CYSEC)
- CSC-03.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC)
- CSC-03.DC_SE.4 Identify the difference between public and private information. (CYSEC)
- CSC-03.DC_RU.1 Identify and discuss positive and negative uses of technology and information and their impact.
- CSC-03.DC_RU.2 Recognize similarities and differences between in-person bullying and cyberbullying.
- CSC-03.DC_RU.3 Develop a code of conduct, explain, and practice appropriate behavior and responsibilities while participating in an online community.
- CSC-03.DC_RU.4 Comply with Acceptable Use Policies.
- CSC-03.DC_DI.1 Recognize the permanence of their actions in the digital world.
- CSC-04.DC_SE.1 Identify and explain issues related to responsible use of technology and information, and describe personal consequences of inappropriate use. (CYSEC)
- CSC-04.DC_SE.2 Create secure authentication to insure privacy. (CYSEC)
- CSC-04.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC) (Continued growth)
- CSC-04.DC_SE.4 Recognize when it is safe to share private information online. (CYSEC)
- CSC-04.DC_RU.1 Discuss basic issues related to the appropriate use of technology and information, and the consequences of inappropriate use.
- CSC-04.DC_RU.2 Identify strategies for dealing responsibly with cyberbullying and reporting inappropriate behavior.
- CSC-04.DC_RU.3 Develop a code of conduct, explain, and practice appropriate behavior and responsibilities while participating in an online community. (Continued growth)
- CSC-04.DC_RU.4 Comply with Acceptable Use Policies.
- CSC-04.DC_DI.1 Explain the importance of your digital identity.
- CSC-05.DC_SE.1 Recognize that there are real-world cybersecurity problems (i.e.hacking) when interacting online. (CYSEC)
- CSC-05.DC_SE.2 Create secure authentication to insure privacy. (CYSEC) (Continued growth)
- CSC-05.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC) (Continued growth)
- CSC-05.DC_SE.4 Apply strategies to keep your private information safe online. (CYSEC)
- CSC-05.DC_RU.1 Demonstrate an understanding of the appropriate use of technology and information and the consequences of inappropriate use.
- CSC-05.DC_RU.2 Use strategies that prevent and deal responsibly with cyberbullying and inappropriate behavior.
- CSC-05.DC_RU.3 Develop a code of conduct, explain, and practice appropriate behavior and responsibilities while participating in an online community. (Continued growth)
- CSC-05.DC_RU.4 Comply with Acceptable Use Policies.
- CSC-05.DC_DI.1 Explain the importance of your digital identity. (Continued growth)
- CSC-06.DC_SE.1 Identify steps for responding to uncomfortable situations when interacting online. (CYSEC)
- CSC-06.DC_SE.2 Identify basic methods to maintain digital privacy and security. (CYSEC)
- CSC-06.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC)
- CSC-06.DC_SE.4 Identify threats to personal cybersecurity. (CYSEC)
- CSC-06.DC_RU.1 Identify different forms of cyberbullying.
- CSC-06.DC_RU.2 Identify strategies to stop cyberbullying.
- CSC-06.DC_RU.3 Use appropriate digital etiquette in a variety of situations.
- CSC-06.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-06.DC_DI.1 Describe personal online usage and determine how it affects identity on- and offline.
- CSC-07.DC_SE.1 Identify steps for responding to uncomfortable situations when interacting online. (CYSEC) (Continued growth)
- CSC-07.DC_SE.2 Identify a variety of methods to maintain digital privacy and security. (CYSEC)
- CSC-07.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC) (Continued growth)
- CSC-07.DC_SE.4 Describe how to respond to threats to personal cybersecurity. (CYSEC)
- CSC-07.DC_RU.1 Describe different forms of cyberbullying and the effects on all parties involved.
- CSC-07.DC_RU.2 Identify strategies to prevent and stop cyberbullying.
- CSC-07.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth)
- CSC-07.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-07.DC_DI.1 Evaluate how digital identity can impact a person now and in the future.
- CSC-08.DC_SE.1 Identify steps for responding to uncomfortable situations when interacting online. (CYSEC) (Continued growth)
- CSC-08.DC_SE.2 Identify advanced methods to maintain digital privacy and security. (CYSEC)
- CSC-08.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC) (Continued growth)
- CSC-08.DC_SE.4 Discuss the consequences of identity theft. (CYSEC)
- CSC-08.DC_RU.1 Describe different forms of cyberbullying and the effects on all parties involved. (Continued growth)
- CSC-08.DC_RU.2 Identify strategies to prevent and stop cyberbullying.
- CSC-08.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth)
- CSC-08.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-08.DC_DI.1 Evaluate how digital identity can impact a person now and in the future. (Continued growth.)
- CSC-09.DC_SE.1 Recognize the effects sharing information online can have on others' privacy. (CYSEC)
- CSC-09.DC_SE.2 Know how to modify account settings to protect privacy and security. (CYSEC)
- CSC-09.DC_SE.3 Recognize that data-collection technology can be used to track navigation online. (CYSEC)
- CSC-09.DC_SE.4 Describe ways to prevent identity theft. (CYSEC)
- CSC-09.DC_RU.1 Apply cyberbullying prevention strategies.
- CSC-09.DC_RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. (CYSEC)
- CSC-09.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth)
- CSC-09.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-09.DC_DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. (CYSEC)
- CSC-10.DC_SE.1 Implement best practices to secure personal information. (CYSEC)
- CSC-10.DC_SE.2 Recognize the importance of monitoring your private data. (CYSEC)
- CSC-10.DC_SE.3 Manage personal data to maintain digital privacy and security and are aware of data-collection technology used to track online behaviors. (CYSEC)
- CSC-10.DC_SE.4 Identify if their private data has been altered and can react appropriately. (CYSEC)
- CSC-10.DC_RU.1 Apply cyberbullying prevention strategies. (Continued growth)
- CSC-10.DC_RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. (CYSEC) (Continued growth)
- CSC-10.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth)
- CSC-10.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-10.DC_DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. (CYSEC) (Continued growth)
- CSC-11.DC_SE.1 Understand encryption and how it is used to protect data. (CYSEC)
- CSC-11.DC_SE.2 Explain the privacy concerns related to the collection and generation of data through automated processes. (CYSEC)
- CSC-11.DC_SE.3 Manage personal data to maintain digital privacy and security and are aware of data-collection technology used to track online behaviors. (CYSEC) Continued Growth)
- CSC-11.DC_SE.4 Develop a plan to recover from an incident that was tied to unauthorized access. (CYSEC)
- CSC-11.DC_RU.1 Apply cyberbullying prevention strategies. (Continued growth)
- CSC-11.DC_RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. (CYSEC) (Continued growth)
- CSC-11.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth)
- CSC-11.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-11.DC_DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. (CYSEC) (Continued growth)
- CSC-12.DC_SE.1 Understand encryption and how it is used to protect data. (CYSEC) (Continued Growth)
- CSC-12.DC_SE.2 Illustrate how sensitive data can be affected by malware and other attacks. (CYSEC)
- CSC-12.DC_SE.3 Manage personal data to maintain digital privacy and security and are aware of data-collection technology used to track online behaviors. (CYSEC) Continued Growth)
- CSC-12.DC_SE.4 Develop a plan to recover from an incident that was tied to unauthorized access. (CYSEC) (Continued Growth)
- CSC-12.DC_RU.1 Apply cyberbullying prevention strategies. (Continued growth)
- CSC-12.DC_RU.2 Apply safe and ethical behaviors to personal electronic communication and interaction. (CYSEC) (Continued growth)
- CSC-12.DC_RU.3 Use appropriate digital etiquette in a variety of situations. (Continued growth)
- CSC-12.DC_RU.4 Understand the purpose of and comply with Acceptable Use Policies.
- CSC-12.DC_DI.1 Manage a digital identity and be aware of the permanence of actions in the digital world. (CYSEC) (Continued growth)
- PASTE
- PASTE
- PASTE