Please enable JavaScript to use CodeHS

AK 6-8: 8.NI.C.01

CodeHS Lessons

Evaluate physical and digital procedures that could be implemented to protect electronic data/information. Explain the impacts of malware (e.g., hacking, ransomware).

Standard
7.7 The Impact of the Internet
9.4 Privacy & Security
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
Standard
12.7 The Impact of the Internet
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
Standard
3.7 The Impact of the Internet
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
2.4 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.6 Privacy & Security
Standard
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.3 Privacy & Security
Standard
1.3 Impact of Cybersecurity
2.4 Privacy & Security
Standard
1.6 Privacy & Security
Standard
4.4 Privacy & Security
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity