# CTE Resource Center - Verso - Computer Information Systems Task 1706535554

CTE Resource Center - Verso

Virginia’s CTE Resource Center

Identify concepts of cyber security and cyber forensics, honesty, courtesy, and confidentiality related to information and e-mail systems and social networking (e.g., spam, viruses, e-mail etiquette).

Definition

Identification should include a list of items related to

  • system security (i.e., ensuring information is transmitted according to approved protocol)
  • technological integrity (i.e., verifying the source of information and ensuring information on a user’s screen is the same as what was sent)
  • electronic courtesy (i.e., ensuring the rules of network etiquette are followed)
  • confidentiality (i.e., ensuring through technology that information remains private and secure).

Related Standards of Learning

History and Social Science

GOVT.1

The student will demonstrate skills for historical thinking, geographical analysis, economic decision making, and responsible citizenship by

  1. planning inquiries by synthesizing information from diverse primary and secondary sources;
  2. analyzing how political and economic trends influence public policy, using demographic information and other data sources;
  3. comparing and contrasting historical, cultural, economic, and political perspectives;
  4. evaluating critically the quality, accuracy, and validity of information to determine misconceptions, fact and opinion, and bias;
  5. constructing informed, analytic arguments using evidence from multiple sources to introduce and support substantive and significant claims;
  6. explaining how cause-and-effect relationships impact political and economic events;
  7. taking knowledgeable, constructive action, individually and collaboratively, to address school, community, local, state, national, and global issues;
  8. using a decision-making model to analyze the costs and benefits of a specific choice, considering incentives and possible consequences;
  9. applying civic virtues and democratic principles to make collaborative decisions; and
  10. communicating conclusions orally and in writing to a wide range of audiences, using evidence from multiple sources and citing specific sources.

GOVT.9

The student will apply social science skills to understand the process by which public policy is made by

  1. defining public policy and determining how to differentiate public and private action;
  2. examining different perspectives on the role of government;
  3. describing how the national government influences the public agenda and shapes public policy by examining examples such as the Equal Rights Amendment, the Americans with Disabilities Act (ADA), and Section 9524 of the Elementary and Secondary Education Act (ESEA) of 1965;
  4. describing how the state and local governments influence the public agenda and shape public policy;
  5. investigating and evaluating the process by which policy is implemented by the bureaucracy at each level;
  6. analyzing how the incentives of individuals, interest groups, and the media influence public policy; and
  7. devising a course of action to address local and/or state issues.

Other Related Standards

Common Career Technical Core

IT10

Describe the use of computer forensics to prevent and solve information technology crimes and security breaches.

IT4

Demonstrate positive cyber citizenry by applying industry accepted ethical practices and behaviors.

IT8

Recognize and analyze potential IT security threats to develop and maintain security requirements.

FBLA Competitive Events and Activities Areas

Business Law

 

Business Procedures

 

Cyber Security

 

Help Desk

 

Introduction to Information Technology

 

Network Design

 

Networking Concepts

 

Web Site Design

The topic for this event changes from year to year. The annual topic may or may not correlate with this particular course. Please refer to the current Virginia FBLA State Handbook.

Microsoft Imagine Academy Resources

[2.028] Microsoft Digital Literacy: Computer Security and Privacy—Lesson 5