Network security depends on a combination of hardware, software, and practices that control access to data and systems. The needs of users and the sensitivity of data determine the level of security implemented. Potential security problems, such as denial-of-service attacks, ransomware, viruses, worms, spyware, and phishing, present threats to sensitive data. Students might reflect on case studies or current events in which governments or organizations experienced data leaks or data loss as a result of these types of attacks.
Standard detail
Depth 2Parent ID: D5152017A05941F2AFF290351ADFAE62Standard set: Level 3A: Grades 9-10 (Ages 14-16)
Original statement
Quick facts
- Statement code
- Standard ID
- 4FB49EF2985546A5B59ECC91924843BE
- Subject
- Computer Science
- Grades
- 09, 10
- Ancestor IDs
- D5152017A05941F2AFF290351ADFAE62B35BD3ECB674406E82E1F4AF5072563C
- Source document
- CSTA K-12 Computer Science Standards (Revised 2017)
- License
- CC BY 4.0 US