Standard(s):
[DLIT] (3) 15 : 9) Identify the proper use and operation of security technologies.
Examples: Passwords, virus protection software, spam filters, pop-up blockers.
[DLIT] (4) 14 : 8) Demonstrate the proper use and operation of security technologies.
Examples: Passwords, virus protection software, spam filters, pop-up blockers.
[DLIT] (5) 15 : 9) Explain the proper use and operation of security technologies.
Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.
[DLIT] (5) 30 : 24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.
Examples: Logging in at school, logging personal devices to public networks.
[DLIT] (9-12) 42 : 36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.
Examples: Two-factor authentication, password requirements, geolocation requirements.