MI.CS.3B.NI.03

Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).

MI.CS.3B.NI.032020-12-11T18:39:55+00:00

MI.CS.3B.NI.04

Compare ways software developers protect devices and information from unauthorized access.

MI.CS.3B.NI.042020-12-11T18:39:55+00:00

MI.CS.3A.NI.04

Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, [...]

MI.CS.3A.NI.042020-12-11T18:39:51+00:00

MI.CS.3A.NI.05

Give examples to illustrate how sensitive data can be affected by malware and other attacks.

MI.CS.3A.NI.052020-12-11T18:39:51+00:00

MI.CS.3A.NI.06

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and [...]

MI.CS.3A.NI.062020-12-11T18:39:51+00:00

MI.CS.3A.NI.07

Compare various security measures, considering tradeoffs between the usability and security of a computing system.

MI.CS.3A.NI.072020-12-11T18:39:51+00:00

MI.CS.3A.NI.08

Explain tradeoffs when selecting and implementing cybersecurity recommendations.

MI.CS.3A.NI.082020-12-11T18:39:51+00:00

MI.CS.2.NI.04

Model the role of protocols in transmitting data across networks and the Internet.

MI.CS.2.NI.042020-12-11T18:39:47+00:00

MI.CS.2.NI.05

Explain how physical and digital security measures protect electronic information.

MI.CS.2.NI.052020-12-11T18:39:47+00:00

MI.CS.2.NI.06

Apply multiple methods of encryption to model the secure transmission of information.

MI.CS.2.NI.062020-12-11T18:39:47+00:00
Go to Top