Cybersecurity and Technical Support 110

GCO1: Students will demonstrate communication and operational skills specific to supporting and securing digital technology.

Overall Expectations:

SCO1.2: Students will articulate challenges and hypothesize solutions to complete projects and resolve cybersecurity events

Specific Expectations:

Articulate challenges

  • that may involve people and/or technology
  • to analyze where cybersecurity vulnerabilities exist

Hypothesize solutions

  • that may be involved in completing projects and resolving cybersecurity events
  • to determine possible strategies to mitigate cybersecurity vulnerabilities
  • to proactively and reactively mitigate cybersecurity risks involving people and technology by keeping a record of possible solutions for mitigating a variety of cybersecurity risks

MediaSmarts Resources

Online Relationships: Respect and Consent
Privacy Rights of Children and Teens
Secure Comics

 

GCO2: Students will use computational thinking skills to analyze challenges and to create and evaluate solutions

Overall Expectations:

SCO2.4: Students will analyze data, identify risks and troubleshoot by using algorithms

Specific Expectations:

Algorithmic Thinking

  • to evaluate and defend a cybersecurity target by analyzing data, and by identifying and mitigating risks
  • to create a repeatable list that will help investigate and solve issues related to cybersecurity events
  • to explain how algorithms are used by online systems, and the potential inaccuracies and vulnerabilities

Analysis

  • to troubleshoot a cybersecurity event, including vulnerability management
  • to design a troubleshooting guide to help others respond to cybersecurity events
  • to evaluate and improve a troubleshooting guide

MediaSmarts Resources

GCO3: Students will develop and demonstrate skill in managing computers, networks and cybersecurity threats

Overall Expectations:

SCO3.3: Students will develop and demonstrate skills to identify and counter cybersecurity threats.

Specific Expectations:

Cybersecurity Threats

  • Demonstrate use of proper threat terminology
  • Understand and implement post-threat detection and analysis (including the order of operations)
  • Determine and implement appropriate operating system security settings
  • Determine and implement password security techniques

Vulnerability Assessment

  • Understand and identify network vulnerabilities (e.g. public Wi-Fi hotspots)
  • Understand and identify computer vulnerabilities (e.g. Bluetooth on personal devices)
  • Identify common communication encryption (e.g. DES, MD5, RSA, SHA-1)

Penetration Testing

  • Identify the technical means an attacker might use to gain access to a computer or network

MediaSmarts Resources

Overall Expectations:

SCO3.4: Students will communicate an understanding of cybersecurity events, causes, impacts, responses, and outcomes using technical and non-technical language.

Specific Expectations:

Identify and analyze the people and their roles in cybersecurity events

  • Consider potential victims and stakeholders
  • Consider potential perpetrators and sponsors
  • Consider potential motives of all parties
  • Consider the actions, as well as causes and effects of the actions
  • Persuade an audience about your interpretation of a cybersecurity event using data and inference

MediaSmarts Resources