Standards Database Logo
Home | Browse | Search | Purpose | History | Process | Acknowledgment| Reference

 


 


Topic: Security of information systems 

Business Education

 Standard 28.  Understands plans and procedures for maintaining the security of information systems
  Level IV (Grade 9-12)
   Benchmark 1.Identifies security risks to information systems facilities, data, communications systems, and applications
    Knowledge/skill statements
     1.Identifies security risks to information systems facilities
     2.Identifies security risks to information systems data
     3.Identifies security risks to information systems communications systems
     4.Identifies security risks to information systems applications
   Benchmark 2.Knows federal and state laws pertaining to computer crime, fraud, abuse, and electronic security breeches
    Knowledge/skill statements
     1.Knows federal laws pertaining to computer crime
     2.Knows federal laws pertaining to fraud
     3.Knows federal laws pertaining to abuse
     4.Knows federal laws pertaining to electronic security breeches
     5.Knows state laws pertaining to computer crime
     6.Knows state laws pertaining to fraud
     7.Knows state laws pertaining to abuse
     8.Knows state laws pertaining to electronic security breeches
   Benchmark 3.Knows effective controls for the maintenance of confidentiality in information systems facilities, data, communications, and applications (e.g., passwords, restricted access)
    Knowledge/skill statements
     1.Understands passwords are effective controls for confidentiality in information systems facilities
     2.Understands passwords are effective controls for confidentiality in information systems data
     3.Understands passwords are effective controls for confidentiality in information systems communications
     4.Understands passwords are effective controls for confidentiality in information systems applications
     5.Understands restricted access is an effective control for confidentiality in information systems facilities
     6.Understands restricted access is an effective control for confidentiality in information systems data
     7.Understands restricted access is an effective control for confidentiality in information systems communications
     8.Understands restricted access is an effective control for confidentiality in information systems applications
   Benchmark 4.Knows precautions that can be taken to protect against electronic viruses and computer crime
    Knowledge/skill statements
     1.Knows precautions that protect against electronic viruses
     2.Knows precautions that protect against computer crime
   Benchmark 5.Knows procedures used to restart and recover from possibly damaging situations (e.g., system failure, computer virus)
    Knowledge/skill statements
     1.Knows procedures used to restart and recover from system failure
     2.Knows procedures used to restart and recover from computer viruses