Digital Literacy and Computer Science (2018) Grade(s): 7

DLCS18.7.25

List common methods of system cybersecurity.

COS Examples

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content

Knowledge

Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

Skills

Students are able to:
  • list common methods of protecting digital data online.

Understanding

Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.

Vocabulary

  • cybersecurity
ALSDE LOGO