GCO1: Students will demonstrate operational skills specific to supporting and securing digital technology
Overall Expectations:
SCO1.2: Students will articulate challenges and hypothesize solutions to complete projects and resolve cybersecurity events
Specific Expectations:
Articulate challenges
- that may involve people and/or technology
- to analyze where cybersecurity vulnerabilities exist
Hypothesize solutions
- that may be involved in completing projects and resolving cybersecurity events
- to determine possible strategies to mitigate cybersecurity vulnerabilities
- to proactively and reactively mitigate cybersecurity risks involving people and technology
- by keeping a record of possible solutions for mitigating a variety of cybersecurity risks
MediaSmarts Resources
GCO2: Students will use computational thinking skills to analyze challenges and to create and evaluate solutions
Overall Expectations:
SCO2.4: Students will analyze data, identify risks, and troubleshoot by using algorithms
Specific Expectations:
Algorithmic Thinking
- to evaluate and defend a cybersecurity target by analyzing data, and by identifying and mitigating risks
- to create a repeatable list that will help investigate and solve issues related to cybersecurity events
- to explain how algorithms are used by online systems, and the potential inaccuracies and vulnerabilities
Analysis
- to troubleshoot a cybersecurity event, including vulnerability management
- to design a troubleshooting guide to help others respond to cybersecurity events
- to evaluate and improve a troubleshooting guide
MediaSmarts Resources
Secure Comics
The Invisible Machine: Big Data and You
Overall Expectations:
SCO2.5: Students will execute a solution and evaluate the solution’s validity, efficiency, and effectiveness
Specific Expectations:
Execute a Solution
- to finalize and complete a solution to a cybersecurity problem or challenge
- to implement, execute, and engage a solution to a cybersecurity problem or challenge
Evaluate a Solution
- to evaluate, test, or validate a solution to a cybersecurity problem or challenge
- to assess or appraise a solutions efficiency and effectiveness regarding a cybersecurity problem or challenge
MediaSmarts Resources
GCO3: Students will analyze cybersecurity challenges related to individuals, governments, non-profits, and business
Overall Expectations:
SCO3.4: Students will evaluate the risk and impact that cybersecurity has on privacy
Specific Expectations:
Privacy
- to recognize the importance of the privacy of personal information
- to evaluate systems for their protection and privacy of personal information
- to evaluate systems for the access and control provided to users regarding their privacy and personal information
- to evaluate data breaches and their impact on data, systems, and devices
- to evaluate data breaches and the damage to individuals and organizations including repercussions that involve:
- financial loss and loss of revenue,
- compensation claims,
- psychological distress,
- emotional distress, and
- loss of reputation and trust
MediaSmarts Resources
- #ForYou: The Algorithm Game
- Online Relationships: Respect and Consent
- Privacy Rights of Children and Teens
- Secure Comics
- The Privacy Dilemma: Lesson Plan for Senior Classrooms
- Who Knows? Your Privacy in the Information Age
- Your Online Resume
Overall Expectations:
SCO3.5: Students will analyze the ethical practices and societal implications related to preventing and responding to cybersecurity threats
Specific Expectations:
Ethical Practices:
- to identify ethical implications of a cybersecurity situation or case
Social Implications:
- to distinguish between cybersecurity events that are ethical and unethical, legal, and illegal
- to recognize and evaluate Canadian laws designed to protect individuals and organizations regarding cybersecurity events