Career and Technical Education (2022) Grade(s): 10-12 - Information Technology

CTE22.IT.C3.20

Investigate the threats and vulnerabilities associated with specialized technologies, including operating within a cloud-based environment.

COS Examples

Examples: mobile, Internet of Things, embedded, real-time operating system, System-on-Chip, field programmable gate array, physical access controls, building automation systems, drones and vehicles, supervisory control and data acquisition systems (SCADA), cloud deployment models; insecure application programming interfaces, improper key management, unprotected storage, insufficient logging and monitoring

ALSDE LOGO