Please enable JavaScript to use CodeHS

CSTA 2: 2-IC-20

CodeHS Lessons

Compare tradeoffs associated with computing technologies that affect people's everyday activities and career options.

Standard
11.10 Creative Credit & Copyright
Standard
13.10 Creative Credit & Copyright
Standard
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
9.10 Impact of the Internet
14.1 Project: Security Assessment Report
Standard
4.4 Cloud Computing
6.3 Impact of the Internet
6.4 Cybersecurity
6.5 The CIA Triad
6.6 Encryption
Standard
3.4 Cloud Computing
Standard
2.3 Impact of the Internet
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption
Standard
1.4 Digital Footprint and Reputation
Standard
2.1 History of Computers
2.5 Future of Computing
3.1 Computer Model
7.1 Intro to the Internet
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.3 Internet Safety
9.4 Privacy & Security
9.5 Information Literacy
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
15.4 The CIA Triad
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
15.1 Module Overview - Cybersecurity
Standard
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
Standard
12.1 Intro to the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
10.1 History of Computers
10.5 Future of Computing
10.6 Computer Model
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
3.1 Intro to the Internet
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
5.1 History of Computers
5.1 History of Computers
2.5 Future of Computing
2.6 Computer Model
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.9 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
11.9 Common Security Problems
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
4.2 History of Computers
12.2 Future of Computing
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
3.2 History of Computers
14.2 Future of Computing
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
21.1 History of Computers
21.1 History of Computers
4.5 Future of Computing
Standard
1.1 History of Computers
1.5 Future of Computing
1.7 Intro to the Internet
1.8 The Impact of the Internet
2.1 Computer Model
Standard
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.8 Cyberbullying
4.9 Creative Credit & Copyright
5.1 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
1.6 Common Security Problems
4.5 Impact of the Internet
4.6 Future of Computing
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
5.2 Impact of the Internet
8.2 Impact of Cybersecurity
Standard
11.11 Creative Credit & Copyright
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Common Security Problems
1.13 Project: Public Service Announcement
4.1 History of Computers
4.5 Future of Computing
4.6 Computer Model
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.10 Project: Classic Cipher Newscast
22.12 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
8.1 Module Overview - Cybersecurity
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.2 Cyberbullying
12.3 Internet Safety
12.4 Privacy & Security
12.5 Information Literacy
12.6 Creative Credit & Copyright
12.7 Hacking Ethics
14.9 Common Security Problems
15.10 Impact of the Internet
Standard
4.1 History of Computers
4.5 Future of Computing
6.1 Intro to the Internet
6.7 The Impact of the Internet
7.1 Project: The Effects of the Internet
Standard
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
9.9 Common Security Problems
21.2 Cyberbullying
21.3 Internet Safety
21.4 Privacy & Security
21.5 Information Literacy
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
10.1 Project: Security Assessment Report
24.10 Impact of the Internet
21.1 Digital Footprint and Reputation
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
8.12 Creative Credit & Copyright
Standard
8.12 Creative Credit & Copyright
Standard
3.1 Intro to the Internet
3.8 The Impact of the Internet
9.1 History of Computers
9.5 Future of Computing
16.1 Module Overview - Cybersecurity
16.2 What is Cybersecurity?
16.3 Impact of Cybersecurity
8.1 Digital Footprint and Reputation
8.2 Cyberbullying
8.3 Internet Safety
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
16.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
1.5 Information Literacy
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
2.1 Project: Public Service Announcement
6.8 Impact of the Internet
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
12.1 Project: Classic Cipher Newscast
13.1 Intro to the Internet
13.7 The Impact of the Internet
14.1 Project: The Effects of the Internet
Standard
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
Standard
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
Standard
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
2.2 Creative Credit & Copyright
7.11 Impact of the Internet
Standard
1.1 History of Computers
1.5 Future of Computing
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.4 Cyberbullying
5.5 Internet Safety
5.6 Privacy & Security
5.7 Information Literacy
5.11 Creative Credit & Copyright
5.13 Hacking Ethics
5.14 Project: Public Service Announcement
Standard
3.4 Cloud Computing
4.3 Impact of the Internet
4.4 Cybersecurity
4.5 The CIA Triad
4.6 Encryption
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
5.7 Privacy & Security
5.8 Creative Credit & Copyright
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.8 Information Literacy
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
21.1 History of Computers
21.1 History of Computers
2.5 Future of Computing
2.6 Computer Model
Standard
1.2 Module Overview - Cybersecurity
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
17.9 Common Security Problems
17.9 Common Security Problems
10.10 Impact of the Internet
9.1 Project: Security Assessment Report
Standard
2.1 History of Computers
2.6 Future of Computing
7.11 Creative Credit & Copyright
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.3 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Creative Credit & Copyright
1.5 Project: Public Service Announcement
1.8 Future of Computing
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.4 Hacking Ethics
3.2 Information Literacy
Standard
4.1 History of Computers
4.6 Future of Computing
7.1 Intro to the Internet
7.7 The Impact of the Internet
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.3 Internet Safety
10.4 Privacy & Security
10.5 Information Literacy
10.6 Creative Credit & Copyright
10.7 Project: Public Service Announcement
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
1.8 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.6 Creative Credit & Copyright
4.7 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.5 Privacy & Security
1.7 Creative Credit & Copyright
3.1 Intro to the Internet
3.7 The Impact of the Internet
7.1 History of Computers
7.8 Future of Computing
13.1 Project: The Effects of the Internet
12.1 Project: Public Service Announcement
Standard
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
9.12 Impact of the Internet
8.1 Project: Security Assessment Report
Standard
4.1 History of Computers
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
1.4 Information Literacy
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
Standard
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.10 Common Security Problems
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
9.10 Impact of the Internet
6.1 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.5 Internet Safety
1.6 Privacy & Security
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
Standard
2.1 History of Computers
2.5 Future of Computing
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
9.1 Intro to the Internet
9.7 The Impact of the Internet
13.1 Module Overview - Cybersecurity
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
2.3 Digital Footprint and Reputation
Standard
2.5 Cloud Computing
4.3 Impact of the Internet
4.4 Cybersecurity
4.5 The CIA Triad
4.6 Encryption
Standard
1.3 Digital Footprint and Reputation
Standard
1.3 Digital Footprint and Reputation
Standard
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
Standard
3.1 What is Cybersecurity?
3.2 The CIA Triad
3.3 Digital Footprint and Reputation
3.4 Cyberbullying
3.5 Internet Safety
3.6 Privacy & Security
3.7 Information Literacy
3.10 Creative Credit & Copyright
3.11 Hacking Ethics
3.12 Project: Public Service Announcement
Standard
3.4 Cloud Computing
Standard
2.3 Impact of the Internet
2.4 Cybersecurity
2.5 The CIA Triad
2.6 Encryption