MI.CS.3B.NI.03
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Compare ways software developers protect devices and information from unauthorized access.
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, [...]
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and [...]
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Model the role of protocols in transmitting data across networks and the Internet.
Explain how physical and digital security measures protect electronic information.
Apply multiple methods of encryption to model the secure transmission of information.