Strand: Digital Technologies
Big Idea: Digital Communications
Examining interconnected computing devices and associated risks
Identify steps in a cybersecurity attack and describe how to mitigate against these.
Implement authentication and access control.
Implement intrusion detection.
Defend against a variety of malware.
Explain a botnet and can mitigate against them.
Determine if a group of computers is connected to the Internet.
List potential cybersecurity threat agents (natural, human, and technical).