CYBERSECURITY, CYBERSAFETY AND THE K-12 COMPUTER SCIENCE NATIONAL STANDARDS

Similar documents
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)

Describe the process of parallelization as it relates to problem solving.

Computer Technology Standards of Learning for Virginia s Public Schools

Educational Technology Standard Articulated by Grade Level. Pre-K to 6 th Grade

Competencies for Secondary Teachers: Computer Science, Grades 4-12

Combined Curriculum Document Technology High School

Technology Curriculum Draft Grades 6-8

Students will know and be able to: 1.1. Basic Operations

Massachusetts Technology Literacy Standards

Information Technology Grades Students will know and be able to: Basic Operations 1.1 (I)

INNOVATION CONFIGURATION. Computer Science

2014 New Jersey Core Curriculum Content Standards - Technology

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

SONOMA CHARTER SCHOOL STUDENT USE OF TECHNOLOGY POLICY

CORE Education s Ten Trends matrix 2013

i-safe CURRICULUM SCOPE Elementary Grades K - 5

Course Overview and Outline

North Carolina Professional Technology Facilitator Standards

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

Cyber-safety, Cyber-security, Cyber-ethics, (C3) Digital Literacy Skills

Q. Will the school district provide minimum or strongly recommended minimum software requirements for the devices? A.

Maryland Technology Literacy Standards for Students

EMS BYOD Pilot--Frequently Asked Questions

Teaching Digital Citizenship

COLUSA EDUCATORS WIDE AREA NETWORK (CEWAN) USE OF COMPUTERS, COMPUTER NETWORKS, AND INTERNET SERVICES POLICY

North Carolina School Library Media Coordinators Standards

Elementary and Middle School Technology Curriculum Guidelines

Chariho Regional School District. Technology Education Curriculum. Grades K-8

Cyber Strong Schools Project. Summary Report

INTERNET USE PROCEDURES Almira/Coulee Hartline Cooperative Network Acceptable Use Procedures

National Standards for Quality Online Teaching

i-safe K 12 CURRICULUM SCOPE 06-07

Standards for Quality Online Teaching

Wethersfield Public Schools Course Outline

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

NJ Department of Education Office of Educational Technology Digital Learning NJ (DLNJ)

A partner school of K 12, the leader in K 12 online education

Computer Network System Acceptable Use Policy

POLICIES AND REGULATIONS Policy #78

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

ELE 400 Chapter 1: Introduction to Professional Practice

6-8 Technology Education Program Evaluation. Board of Education Program Report December 10, 2013

Pride Academy Charter School

Office of the Superintendent of Schools MONTGOMERY COUNTY PUBLIC SCHOOLS Rockville, Maryland. May 30, 2013

Years 3-7 Acceptable Use Policy & Agreement

The Climate of College: Planning for Your Future

K-12 Information and Digital Literacy

CYBERSAFETY AT WESTLAKE GIRLS HIGH SCHOOL

There is much confusion today when attempting to understand the differences

BC s Digital Literacy Framework (DRAFT)

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

The National Educational Technology Standards. (Upon which our local standards are based)

Information Literacy and Information Technology Literacy: New Components in the Curriculum for a Digital Culture

Student & Staff Access and Use of Networked Information Resources and Communications

OXFORD COMMUNITY SCHOOLS 10 North Washington Street, Oxford, Michigan ACCEPTABLE USE POLICY

SCHOOL E-SAFETY SELF REVIEW TOOL

COMPUTER NETWORK AND INTERNET ACCEPTABLE USE FOR STUDENTS AND STAFF

Bellevue University Cybersecurity Programs & Courses

Information Technology Career Cluster Digital Design Course Number: Course Standard 1

360 Degree Safe Cymru SELF REVIEW TOOL

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy

ALABAMA DEPARTMENT OF EDUCATION JULY 2009 JOSEPH B. MORTON, STATE SUPERINTENDENT OF EDUCATION No person shall be denied employment, be excluded from

How To Change Your School Learning

Adopted on May 14, 2010

ISTE Technology Student Teaching Assessment

COMPUTER SCIENCE (5651) Test at a Glance

Parent / Guardian Consent for Technology Use in Schools

What is Educational Technology?

Bring Your Own Device (BYOD) Acceptable Use Agreement 2015

Responsible Use of Technology

Educators' Guide Intel Security Digital Safety Program: Think Before You Link Module 1: Cybersafety

Programme Specification. 1. Advanced Computer Science (ACS)

HS Web Design Business and Technology

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Idaho K 12 Content Standards for Computer Science

Howard County Public School System Educational Technology. Essential Curriculum Grades 9-12

NETS for Students: Achievement Rubric

Course: Digital Graphics (Grades )

K-20 Network Acceptable Use Guidelines/Internet Safety Requirements

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

ACCEPTABLE USE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY

Revisioning Graduate Teacher Education in North Carolina Master of Arts in Elementary Education Appalachian State University

Emmett School District, Idaho - Policy & Regulation

Policies Concerning the use of Computers

BOARD OF EDUCATION POLICY

District Technology Guidelines. for Students and Parents/Guardians, updated for

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

GENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1

Bring Your Own Device (BYOD) and Mobile Device Management.

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Technology Curriculum Kindergarten Gwinn Area Community Schools

21st Century Learning and Technology

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Educational Technology and Library Media Learning Expectations k-5

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Information Technology Career Cluster Introduction to Digital Technology Course Number

Virginia Primary School Learning Together, Learning for our Future

Clarifying Misconceptions. between technology education. and Educational Technology

Ensuring Exemplary. Teaching in an Essential Discipline:

Transcription:

CYBERSECURITY, CYBERSAFETY AND THE K-12 COMPUTER SCIENCE NATIONAL STANDARDS INTRODUCTION The invention of the computer in the 20 th century was a once in a millennium event, comparable in importance to the development of writing or the printing press. s have enormous impact on the way we live, think, and act. It is hard to overestimate their importance in the future. In fact, many believe that the true computer revolution will not happen until everyone can understand the technology well enough to use it in truly innovative ways. But as is often the case with new technologies, the increasing ubiquity of computers in our lives and in the systems that support and protect those lives comes with its own set of challenges. Our growing dependence on computing engenders a profound need to ensure that we know how to protect ourselves as users and how to ensure the security of the systems that protect our very lives. For these reasons, both cyber safety and cyber security are deeply embedded in the CSTA K 12 Science Standards. The academic discipline of Science spans a wide range of computing endeavors, from theoretical foundations to robotics, computer vision, intelligent systems, and bioinformatics. The work of computer scientists is concentrated in three areas: designing and implementing secure software, developing effective ways to solve computing problems, and devising new ways to use computers. In schools, computer science learning is a deeply scaffolded experience (as it is in all rigorous academic disciplines) and a great deal of work is required to ensure that, at each step, students learn and master the skills and concepts that form the knowledge foundations for their lives. Like a collage, assembled from a multitude of small, layered pieces, a comprehensive set of standards ensures that foundational knowledge leads to deeper knowledge and deeper knowledge leads to mastery, and all of this learning is ageappropriate and engaging. This document teases out the specific learning standards that address cyber safety and cyber security with the goal of making these standards more obvious for teachers and, at the same time, enabling the education community to create engaging opportunities to specifically address these standards as part of every student s school experience. THE ORGANIZATIONS OF THE CSTA STANDARDS The CSTA K 12 Science Standards are organized into three levels each containing discrete learning expectations. These standards are based on a model where each of the three levels represents a specific set of grades and courses. Level 1 provides the learning standards for students in Grades K 6, Level 2 provides the learning standards for students in Grades 6 9, and Level 3 provides the learning standards for 1

students in each of three discrete courses in grades 9 12. The overall structure of this model is shown in Figure 1. Level 1 Grades K 6 Level 2 Grades 6 9 Level 3 Grades 9 12 Science and Me Science and Community Science in the Modern World Applying Concepts and Creating Real- World Solutions Science Concepts and Practices Topics in Science Within these standards, levels One ( Science and Me) and Two ( Science and Community) contain learning standards focusing primarily on cyber safety while level Three ( Science in the Modern World, Science Concepts and Practices, and Topics in Science) contain the learning standards focusing primarily on cyber security At each level, the standards are further organized by strand. The five complementary and essential strands throughout all three levels are: computational thinking; collaboration; computing practice; computers and communication devices; and community, global, and ethical impacts. These strands not only demonstrate the richness of computer science but also help organize the subject matter for students so that they can begin to perceive computer science as engaging and relevant to all academic field (especially STEM), and as more than a solitary pursuit. Cyber safety and cyber security learning objectives are located primarily in the following two strands: and Communications Devices (with its focus on the practice of good internet citizenship), Community, Global, and Ethical Impacts (with its emphasis on the ethical use of computers and networks and the principles of personal privacy, network security, software licenses, and copyright), and Computing Practice & Programming (with its focus on developing secure systems). 2

CYBER SAFETY AND CYBER SECURITY IN THE CSTA STANDARDS This section points to the specific standards that relate to cyber safety and cyber security at each level and within the relevant strands. The specific standards are listed along with their strand and level codes to make them easier to find within the main standards document and the strand and level charts included at the end of that document. For ease of identification, cyber safety standards appear in purple text and cyber security standards in green text. Level 1: Science and Me s and Communications Devices (CD) Grades 3 6 (L1:6.CD) Understand the pervasiveness of computers and computing in daily life (e.g., voice mail, downloading videos and audio files, microwave ovens, thermostats, wireless Internet, mobile computing devices, GPS systems, etc.). Identify that information is coming to the computer from many sources over a network. Grades K 3 (L1:3.CI) Practice responsible digital citizenship (legal and ethical behaviors) in the use of technology systems and software. Identify positive and negative social and ethical behaviors for using technology. Grades 3 6 (L1:6.CI) Discuss basic issues related to responsible use of technology and information, and the consequences of inappropriate use. Identify the impact of technology (e.g., social networking, cyber-bullying, mobile computing and communication, web technologies, cyber security, and virtualization) on personal life and society. Evaluate the accuracy, relevance, appropriateness, comprehensiveness, and biases that occur in electronic information sources. Understand ethical issues that relate to computers and networks (e.g., equity of access, security, privacy, copyright, and intellectual property). Level Two: Science and Community Computing Practice & Programming (CPP) Demonstrate good practices in personal information security, using passwords, encryption, and secure transactions. 3

Exhibit legal and ethical behaviors when using information and technology and discuss the consequences of misuse. Describe ethical issues that relate to computers and networks (e.g., security, privacy, ownership, and information sharing). Level Three: Science in the Modern World Computing Practice and Programming (CPP) Use various debugging and testing methods to ensure program correctness (e.g., test cases, unit testing, white box, black box, integration testing) Explain the principles of security by examining encryption, cryptography, and authentication techniques. Describe strategies for determining the reliability of information found on the Internet. Describe how different kinds of software licenses can be used to share and protect intellectual property. Discuss the social and economic implications associated with hacking and software piracy. Describe security and privacy issues that relate to computer networks. Level Three: Science Concepts and Practices Computing Practice and Programming (CPP) Explore principles of system design in scaling, efficiency, and security. Deploy principles of security by implementing encryption and authentication strategies. Analyze the beneficial and harmful effects of computing innovations. Identify laws and regulations that impact the development and use of software. Analyze the impact of government regulation on privacy and security. Level Three: Topics in Science This section of the CSTA K 12 Science Standards does not provide specific learning standards, but rather, suggests a number of possible topics courses for students who have completed the Level 1 and Level 2 courses and possibly the Level 3A course as well. These are intended to be project-based courses that can be either a half-year or fullyear courses or courses leading to industry certification (such as Quick Security+). Many teachers are now developing their own experimental cyber security courses. This is both a good thing and a cause for concern. To ensure that student learning is conceptually 4

appropriate, effectively scafolded, and adequately assessed, it is essential that these new courses be grounded in standards. CONCLUSION This document identifies the specific learning outcomes in the CSTA K 12 Science Standards that include specific cyber safety and cyber security learning content. It is hoped that this information will prove useful for educators developing discrete modules that can be inserted into existing courses, developing special topics courses, or simply ensuring that all students are adequately covering these critical concepts. Beyond the standards, the computer science education community must also begin to grapple with the pressing issue of helping students to understand the rich opportunities that the field of cyber security offers. If we are to begin addressing the critical pipeline shortage in this field, we must have homegrown experts, and to achieve this, we must help students understand that a career in cyber security offers an extraordinary opportunity for them to save the world with their minds. To achieve this goal, we must begin in elementary school where students are first beginning to find their explore the world beyond themselves and continue in middle school and high school as they plan their futures. CSTA is committed to working with a the broad community of educators and stakeholders to achieve these goals. CONTACT For more information on our cyber safety and cyber security projects or on CSTA in general, please contact: Chris Stephenson CSTA Executive Director cstephenson@csta.acm.org 5