[DLIT] (7) 31 :
25) List common methods of system cybersecurity.
Examples: Various password requirements, two-factor authentication, biometric, geolocation.
[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.
Example: Discuss how password protections and encryption are similar and different.
[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.
a. Recognize user tracking methods and hazards.
Examples: Cookies, WiFi packet sniffing.
b. Understand how to apply techniques to mitigate effects of user tracking methods.
c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.
d. Explain the relationship between online privacy and personal security.
Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.
e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.
Examples: Cyberbullying/harassment, inappropriate sexual communications.
f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.