Cybersecurity 120

GCO1: Students will demonstrate operational skills specific to supporting and securing digital technology

Overall Expectations:

SCO1.2: Students will articulate challenges and hypothesize solutions to complete projects and resolve cybersecurity events

Specific Expectations:

Articulate challenges

  • that may involve people and/or technology
  • to analyze where cybersecurity vulnerabilities exist

Hypothesize solutions

  • that may be involved in completing projects and resolving cybersecurity events
  • to determine possible strategies to mitigate cybersecurity vulnerabilities
  • to proactively and reactively mitigate cybersecurity risks involving people and technology
  • by keeping a record of possible solutions for mitigating a variety of cybersecurity risks

MediaSmarts Resources

Online Relationships: Respect and Consent
Secure Comics
  

 

GCO2: Students will use computational thinking skills to analyze challenges and to create and evaluate solutions

Overall Expectations:

SCO2.4: Students will analyze data, identify risks, and troubleshoot by using algorithms

Specific Expectations:

Algorithmic Thinking

  • to evaluate and defend a cybersecurity target by analyzing data, and by identifying and mitigating risks
  • to create a repeatable list that will help investigate and solve issues related to cybersecurity events
  • to explain how algorithms are used by online systems, and the potential inaccuracies and vulnerabilities

Analysis

  • to troubleshoot a cybersecurity event, including vulnerability management
  • to design a troubleshooting guide to help others respond to cybersecurity events
  • to evaluate and improve a troubleshooting guide

MediaSmarts Resources

Secure Comics
The Invisible Machine: Big Data and You
  

Overall Expectations:

SCO2.5: Students will execute a solution and evaluate the solution’s validity, efficiency, and effectiveness

Specific Expectations:

Execute a Solution

  • to finalize and complete a solution to a cybersecurity problem or challenge
  • to implement, execute, and engage a solution to a cybersecurity problem or challenge

Evaluate a Solution

  • to evaluate, test, or validate a solution to a cybersecurity problem or challenge
  • to assess or appraise a solutions efficiency and effectiveness regarding a cybersecurity problem or challenge

MediaSmarts Resources

Secure Comics
  

GCO3: Students will analyze cybersecurity challenges related to individuals, governments, non-profits, and business

Overall Expectations:

SCO3.4: Students will evaluate the risk and impact that cybersecurity has on privacy

Specific Expectations:

Privacy

  • to recognize the importance of the privacy of personal information
  • to evaluate systems for their protection and privacy of personal information
  • to evaluate systems for the access and control provided to users regarding their privacy and personal information
  • to evaluate data breaches and their impact on data, systems, and devices
  • to evaluate data breaches and the damage to individuals and organizations including repercussions that involve:
    • financial loss and loss of revenue,
    • compensation claims,
    • psychological distress,
    • emotional distress, and
    • loss of reputation and trust

MediaSmarts Resources

Online Relationships: Respect and Consent
Privacy Rights of Children and Teens
Secure Comics
The Privacy Dilemma: Lesson Plan for Senior Classrooms
Who Knows? Your Privacy in the Information Age
Your Online Resume
  

Overall Expectations:

SCO3.5: Students will analyze the ethical practices and societal implications related to preventing and responding to cybersecurity threats

Specific Expectations:

Ethical Practices:

  • to identify ethical implications of a cybersecurity situation or case

Social Implications:

  • to distinguish between cybersecurity events that are ethical and unethical, legal, and illegal
  • to recognize and evaluate Canadian laws designed to protect individuals and organizations regarding cybersecurity events

MediaSmarts Resources

Cyberbullying and the Law
Online Relationships: Respect and Consent
Privacy Rights of Children and Teens
There’s No Excuse: Confronting Moral Disengagement in Sexting