Network security depends on a combination of hardware, software, and practices that control access to data and systems. The needs of users and the sensitivity of data determine the level of security implemented. Every security measure involves tradeoffs between the accessibility and security of the system. Students should be able to describe, justify, and document choices they make using terminology appropriate for the intended audience and purpose. Students could debate issues from the perspective of diverse audiences, including individuals, corporations, privacy advocates, security experts, and government.
Standard detail
Depth 2Parent ID: 0E1372E31EF14D9298FEF5B8C666B384Standard set: Level 3A: Grades 9-10 (Ages 14-16)
Original statement
Quick facts
- Statement code
- Standard ID
- 1334E0805A5E4294BD2B40667BB0C46E
- Subject
- Computer Science
- Grades
- 09, 10
- Ancestor IDs
- 0E1372E31EF14D9298FEF5B8C666B384B35BD3ECB674406E82E1F4AF5072563C
- Source document
- CSTA K-12 Computer Science Standards (Revised 2017)
- License
- CC BY 4.0 US