The above chapter readings include specific knowledge for EKs marked in bold.
Work to include unmarked learning objectives in the CS Field Guide is currently in progress.
EK 6.1.1A The Internet connects devices and networks all over the world.
EK 6.1.1B An end-to-end architecture facilitates connecting new devices and networks on the Internet.
EK 6.1.1C Devices and networks that make up the Internet are connected and communicate using addresses and protocols.
EK 6.1.1D The Internet and the systems built on it facilitate collaboration.
EK 6.1.1E Connecting new devices to the Internet is enabled by assignment of an Internet protocol (IP) address.
EK 6.1.1F The Internet is built on evolving standards, including those for addresses and names.
EK 6.1.1G The domain name system (DNS) translates domain names to IP addresses.
EK 6.1.1H The number of devices that could use an IP address has grown so fast that a new protocol (IPv6) has been established to handle routing of many more devices.
EK 6.1.1I Standards such as hypertext transfer protocol (HTTP), IP, and simple mail transfer protocol (SMTP) are developed and overseen by the Internet Engineering Task Force (IETF).
EK 6.2.2A Hierarchy and redundancy help systems scale.
EK 6.2.2B The redundancy of routing (i.e., more than one way to route data) between two points on the Internet increases the reliability of the Internet and helps it scale to more devices and more people.
EK 6.2.2C Hierarchy in the DNS helps that system scale.
EK 6.2.2D Interfaces and protocols enable widespread use of the Internet.
EK 6.2.2E Open standards fuel the growth of the Internet.
EK 6.2.2F The Internet is a packet-switched system through which digital data is sent by breaking the data into blocks of bits called packets, which contain both the data being transmitted and control information for routing the data.
EK 6.2.2G Standards for packets and routing include transmission control protocol/Internet protocol (TCP/IP).
EK 6.2.2H Standards for sharing information and communicating between browsers and servers on the Web include HTTP and secure sockets layer/transport layer security (SSL/TLS).
EK 6.2.2I The size and speed of systems affect their use.
EK 6.2.2J The bandwidth of a system is a measure of bit rate—the amount of data (measured in bits) that can be sent in a fixed amount of time.
EK 6.2.2K The latency of a system is the time elapsed between the transmission and the receipt of a request.
EK 6.3.1A The trust model of the Internet involves trade-offs.
EK 6.3.1B The DNS was not designed to be completely secure.
EK 6.3.1C Implementing cybersecurity has software, hardware, and human components.
EK 6.3.1D Cyber warfare and cyber crime have widespread and potentially devastating effects.
EK 6.3.1E Distributed denial-of-service attacks (DDoS) compromise a target by flooding it with requests from multiple systems.
EK 6.3.1F Phishing, viruses, and other attacks have human and software components.
EK 6.3.1G Antivirus software and firewalls can help prevent unauthorized access to private data.
EK 6.3.1H Cryptography is essential to many models of cybersecurity.
EK 6.3.1I Cryptography has a mathematical foundation.
EK 6.3.1J Open standards help ensure cryptography is secure.
EK 6.3.1K Symmetric encryption is a method of encryption involving one key for encryption and decryption.
EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides.
EK 6.3.1M Certificate authorities (CAs) issue digital certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model.