2019/2020 Competency-Based Task/Competency List for Cybersecurity in Food and Agriculture, Advanced (8075/36 weeks)
Tasks/competencies when marked as such; they and/or additional tasks/competencies may be taught at the discretion of the school division. All other tasks are considered essential statewide and are required of all students.are considered optional
Demonstrating Personal Qualities and Abilities
Demonstrating Interpersonal Skills
Demonstrating Professional Competencies
- Demonstrate big-picture thinking.
- Demonstrate career- and life-management skills.
- Demonstrate continuous learning and adaptability.
- Manage time and resources.
- Demonstrate information-literacy skills.
- Demonstrate an understanding of information security.
- Maintain working knowledge of current information-technology (IT) systems.
- Demonstrate proficiency with technologies, tools, and machines common to a specific occupation.
- Apply mathematical skills to job-specific tasks.
- Demonstrate professionalism.
- Demonstrate reading and writing skills.
- Demonstrate workplace safety.
Examining All Aspects of an Industry
- Examine aspects of planning within an industry/organization.
- Examine aspects of management within an industry/organization.
- Examine aspects of financial responsibility within an industry/organization.
- Examine technical and production skills required of workers within an industry/organization.
- Examine principles of technology that underlie an industry/organization.
- Examine labor issues related to an industry/organization.
- Examine community issues related to an industry/organization.
- Examine health, safety, and environmental issues related to an industry/organization.
Addressing Elements of Student Life
- Identify the purposes and goals of the student organization.
- Explain the benefits and responsibilities of membership in the student organization as a student and in professional/civic organizations as an adult.
- Demonstrate leadership skills through participation in student organization activities, such as meetings, programs, and projects.
- Identify Internet safety issues and procedures for complying with acceptable use standards.
Exploring Work-Based Learning
Note: Competencies 39-43 have been added to ensure compliance with federal legislation: National FFA Organization's Federal Charter Amendments Act (Public Law 116-7, https://www.congress.gov/116/plaws/publ7/PLAW-116publ7.pdf). All inquiries may be sent to firstname.lastname@example.org. Students are provided opportunities for leadership, personal growth, and career success. Instruction is delivered through three major components: classroom/lab instruction, supervised agricultural experience (SAE) program, and student leadership (FFA).
Exploring Leadership Opportunities through FFA
Identifying the Necessary Skills to Understand Cybersecurity Concerns
- Explain the steps required for logical problem solving.
- Develop a graphic or concept map for the logical flow of information among devices within a network.
- Explain the communication processes on a machine and across networks.
- Compare wired and wireless networks.
- Create wired networks.
- Create wireless networks.
- Compare networking conceptual models.
- Explain connection-oriented and connectionless protocols.
- Explain services, their relationship to the OSI model, and potential vulnerabilities.
Identifying Threats in Precision Agriculture (PA)
- Identify groups affected by the use or misuse of PA.
- Explain the confidentiality, integrity, and availability (CIA) triad model of information security.
- Identify key threats to confidentiality.
- Identify key threats to integrity.
- Identify key threats to availability.
- Explain methods for strengthening the CIA triad as it applies to security in food and agriculture.
- Identify information management and cyber threats facing embedded and digital tools used by PA.
- Identify baseline security controls necessary to mitigate threats in PA.
- Explain agricultural industry standards related to cybersecurity.
- Develop best practices to protect and build resilience into PA.
- Identify the Center for Internet Security’s (CIS) top 20 critical security controls.
- Explain methods of building resilience into rural navigation, communication, and embedded tool applications.
Researching Cybersecurity Vulnerabilities in Livestock and Crop Production
- Explain the technologies used in PA and precision agronomics.
- Describe technologies used in greenhouse production.
- Describe the technologies used in precision livestock farming (PLF).
- Explain threats to PA technologies used in crop and livestock production.
- Explain the vulnerabilities of the technologies used in livestock production.
- Explain how PLF improves animal welfare and minimizes negative environmental effects.
- Identify vulnerabilities in PA technologies used in crop production.
- Explain how in-situ monitoring and data collection technologies are used in production agriculture.
- Explain how PA technologies are used on agricultural machinery and equipment.
Researching Future Trends in Cybersecurity and the Use of Artificial Intelligence (AI) in Food and Agriculture
- Identify how ML algorithms can be integrated into decision-support tools in PA.
- Explain how DSS are used in agriculture.
- Explain the advantages and disadvantages of the Internet of Things (IoT).
- Research AI-driven technologies in agriculture and how they help increase food production with fewer resources.
Researching Potential Threats and Risks in Food and Agriculture
- Explain threats to food and animal feed processing and manufacturing.
- Explain how facilities engaged in the manufacture of food and feed for animals are vulnerable to cyberattack.
- Develop a mitigation plan to address cybersecurity threats related to agricultural production or processing facilities.
- Explain how to mitigate cybersecurity threats related to agricultural equipment and machinery.
- Propose methods to ensure agricultural equipment and machinery are resistant to cyberattack.
- Explain the importance of accuracy of information derived from sensor-based systems.
- Explain how social engineering can promote cybersecurity intrusion.
- Evaluate animal, plant, soil, and/or mechanical test results to identify cybersecurity intrusion.
Researching Cybersecurity in Agricultural Marketing and Distribution
Maintaining Cybersecurity in Agricultural Business Management and Financing
- Explain how cyber intrusion might affect an agricultural enterprise.
- Design a plan to use management controls to secure information and operations and prevent security breaches.
- Create a secure customer relationship management (CRM) database.
- Identify cybersecurity threats facing financial institutions and the effect on the agricultural business sectors.
- Develop a cyber plan to safeguard data.
- Explain how to protect a business against online scams and fraud.
- Research the implications of intellectual property (IP) theft.
- Explain key threats perpetrated by threat actors to manipulate the commodities market.
- Explain national and international cybersecurity laws and policies related to agricultural enterprises.
- Explain the importance of securing a company’s network.
- Explain the costs associated with a data breach, security incident, privacy violation, or phishing/skimming incident.
Exploring Cybersecurity Careers in the Agriculture, Food, and Natural Resource Industries
- Research careers associated with cybersecurity in agriculture.
- Research educational requirements for cybersecurity jobs in agriculture.
- Conduct research on cybersecurity in the food, agriculture, and natural resource industries.
- Conduct an oral presentation on a subject related to cybersecurity in the food and agriculture industries.