Please enable JavaScript to use CodeHS

APCSP20: IOC-2.C.6

CodeHS Lessons

Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised.

Standard
11.9 Cybersecurity
Standard
14.1 Introduction to Cybersecurity
Standard
5.6 Cybersecurity