Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.36

Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

COS Examples

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content

Knowledge

Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.

Skills

Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.

Understanding

Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.

Vocabulary

  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography
ALSDE LOGO