Security measures may include physical security tokens, two-factor authentication, and biometric verification, but choosing security measures involves tradeoffs between the usability and security of the system. The needs of users and the sensitivity of data determine the level of security implemented. Students mightdiscuss computer security policies in place at the local level that present a tradeoff between usability and security, such as a web filter that prevents access to many educational sites but keeps the campus network safe.
Standard detail
Depth 2Parent ID: E117198445C947C3AC795A17AB9CD4ADStandard set: Level 3A: Grades 9-10 (Ages 14-16)
Original statement
Quick facts
- Statement code
- Standard ID
- D9A619618F6341C68CBD5FDD24CBF773
- Subject
- Computer Science
- Grades
- 09, 10
- Ancestor IDs
- E117198445C947C3AC795A17AB9CD4ADB35BD3ECB674406E82E1F4AF5072563C
- Source document
- CSTA K-12 Computer Science Standards (Revised 2017)
- License
- CC BY 4.0 US