| Vocabulary overlap | Cyber.org standards |
|---|---|
| Below 10% (no detectable match) | 102 |
| 10% to 20% | 21 |
| 20% or more | 0 |
I teach to Cyber.org. What CSTA standards am I covering?
A K-12 teacher cross-walking two cyber learning standards
Tasha’s situation
Tasha teaches 7th-grade STEM at a public middle school. Cybersecurity is a four-week unit inside her course, run once a year. She built the unit around the Cyber.org K-12 Cybersecurity Learning Standards because Cyber.org ships a free, ready-to-teach curriculum aligned to them.
Her state has recently adopted a CS framework drawn from the CSTA K-12 CS Standards, and her district is now reporting all CS-related instruction against it. Her principal wants every cyber lesson tagged to a state-framework standard for the next reporting cycle. Tasha has roughly a dozen Cyber.org-aligned lessons in the unit and no time to rebuild them from scratch.
Her question is concrete. Where does her existing Cyber.org-aligned work already cover the state-adopted framework, and where will she have to add something new?
This page uses real data computed against cybedtools v0.2.0. The persona is composite. The question, the code, and the result are not.
Two standards bodies, two roles. CSTA is a voluntary K-12 CS standards body whose work gets adopted into state CS frameworks. The principal is enforcing the state-adopted framework, not CSTA directly. Cyber.org publishes a federally-funded curriculum (free to use) whose standards are not, as a rule, formally adopted as state CS standards. The two are not interchangeable for state-framework reporting.
What we’re asking the data
For each of Tasha’s Cyber.org standards, what’s the closest CSTA standard, and is the match close enough to defend in her reporting?
Vocabulary overlap is the percentage of unique words two standards share, after dropping common words (“the,” “and,” “of”) and very short tokens. 0% means no shared vocabulary, 100% means identical wording. The analytic query page walks through the calculation.
What cybedtools surfaces
A note on what counts as a match before the table arrives. Two K-12 standards on the same general topic share enough genre vocabulary (“network,” “data,” “device”) to land near 10% overlap by themselves. Every match in the table below sits in the 10-20% band, which means same general topic, not necessarily same teaching. Read the matched CSTA standard before claiming coverage.
Of 123 Cyber.org standards, 21 share enough vocabulary with a CSTA standard to be worth a closer look (at least 10% overlap). None overlap heavily. That tracks. Cyber.org covers cybersecurity-specific territory that CSTA’s general CS scope was never designed to address.
| Cyber.org | CSTA closest match | Vocabulary overlap |
|---|---|---|
| 6-8 / CS / Communication and Networking Differentiate between a network device’s MAC and IP addresses. Clarification statement:… |
3A / Networks & the Internet Evaluate the scalability and reliability of networks, by describing the relationship be… |
18.8% |
| K-2 / CS / Operating Systems Describe the role of an operating system. Clarification statement: At this level, stude… |
1A / Computing Systems Use appropriate terminology in identifying and describing the function of common physic… |
14.3% |
| K-2 / CS / Hardware Identify the components or parts of computing devices. Clarification statement: At this… |
1A / Computing Systems Use appropriate terminology in identifying and describing the function of common physic… |
13.6% |
| K-2 / DC / Personally Identifiable Information Distinguish between private vs. public information. Clarification statement: At this le… |
1A / Impacts of Computing Keep login information private, and log off of devices appropriately. |
13.2% |
| 6-8 / CS / Software Identify examples of vulnerabilities that exist in software. Clarification statement: A… |
1A / Computing Systems Use appropriate terminology in identifying and describing the function of common physic… |
12.8% |
| K-2 / CS / Components Recognize that equipment is needed to access a network. Clarification statement: At thi… |
1A / Impacts of Computing Compare how people live and work before and after the implementation or adoption of new… |
12.7% |
| 3-5 / DC / Personally Identifiable Information Define personally identifiable information (PII). Clarification statement: At this leve… |
1A / Impacts of Computing Keep login information private, and log off of devices appropriately. |
11.6% |
| 3-5 / SEC / Cryptography Discuss why and how we encrypt information and communication systems. Clarification sta… |
2 / Networks & the Internet Apply multiple methods of encryption to model the secure transmission of information. |
11.6% |
The matches concentrate where Cyber.org and general computer-science basics overlap: networking, hardware, encryption, and PII.
What this means for Tasha
Her four-week unit is largely complementary to CSTA, not redundant with it. She cannot tag her Cyber.org-aligned lessons to CSTA wholesale and call the work done. Of her dozen-or-so lessons, only the ones touching networking, hardware, encryption, or PII have a defensible CSTA tag. Lessons on physical security, threat actors, or social engineering specifics cover content CSTA does not address.
Two specific cautions show up in the data.
Grade-band drift
The strongest match in the table above pairs a Cyber.org 6-8 networking standard with a CSTA 3A (grades 9-10) networking standard. Vocabulary overlap is real. Cognitive demand is not. A 7th-grader differentiating MAC and IP addresses is not doing the same work as a 10th-grader evaluating network scalability. Tasha teaches 7th grade, so her defensible CSTA target band is Level 2 (grades 6-8). Anything at 3A or above carries grade-band-drift risk she will have to defend separately.
A 10-20% overlap is not coverage
If Tasha’s principal asks why a specific lesson is tagged to a specific CSTA standard, Tasha needs to walk through the actual content overlap, not point at a percentage. The tool surfaces candidates. The practitioner makes the equivalence judgment.
The cyber-specific lessons need a different defense
Social engineering, threat actors, and physical security are precisely the topics some districts have explicit board policies about and that some parents push back on. The defense for those lessons is not CSTA-alignment evidence. The defense is curricular. The lessons implement standards from a CISA-funded K-12 cybersecurity curriculum (Cyber.org). Tasha may need to present that distinction explicitly to her principal, and to her school board if it surfaces there.
What Tasha tells her principal about the 102 unmatched Cyber.org standards
The 123 Cyber.org standards span the full K-12 corpus. Tasha’s four-week 7th-grade unit covers only a subset of those, and for most of the standards her lessons do cover, no CSTA equivalent exists. Her honest reporting answer is “covers Cyber.org standard X, no CSTA equivalent.” Whether her district’s reporting form lets her record that, or whether she has to negotiate an “alternate framework” tag with her principal, is a local question for her CS coordinator. cybedtools surfaces the gap. The reporting workaround is a district-policy conversation.
The lesson-by-lesson move
For each lesson, the workflow is the same. Identify the Cyber.org standard the lesson covers, look up the closest CSTA match in the table, read the matched CSTA standard, decide if it applies. Most lessons land at “covers Cyber.org X, no meaningful CSTA equivalent.” A handful give her dual-tagging.
See also
- The analytic query behind this scenario walks through the data, the metric choice, and the methodology.
- Cyber.org K-12 framework page for Cyber.org’s structure, scope, and licensing.
- CSTA K-12 framework page for CSTA’s structure, scope, and licensing.
- The two-tier vocabulary for why cybedtools can ask the question across the two frameworks at all.
- For lessons CSTA cannot tag, the NICE Framework K-12 working group’s high-school cyber-pathway alignments are the next-likeliest external tag, though cybedtools does not currently materialize those K-12 mappings as RDF triples.