Cybersecurity and Digital Defense · Networks & Security

Incident Response and Ethics

Developing protocols for when a breach occurs and understanding the legal landscape of hacking.

Key Questions

  1. 1What steps should an organization take immediately after discovering a data breach?
  2. 2How do we balance the need for security with the right to personal privacy?
  3. 3What defines the line between ethical hacking and cybercrime?

Common Core State Standards

CSTA: 3A-IC-26CSTA: 3A-NI-05
Grade: 10th Grade
Subject: Computer Science
Unit: Cybersecurity and Digital Defense
Period: Networks & Security

Ready to teach this topic?

Generate a complete, classroom-ready active learning mission in seconds.

Browse curriculum by country

AmericasUSCAMXCLCOBR
Asia & PacificINSGAU