Resources cannot be aligned to this standard, browse sub-standards to find lessons.
Discuss the concepts and justifications for using secure design techniques.
Discuss the laws surrounding intellectual property.
Evaluate the social and emotional implications of privacy in the context of safety, law, and ethics.
Report job outlook, demand, and projected wages for computer science careers.
Give examples to illustrate how sensitive data can be affected by malware and other attacks.