- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company

MD 9-10: 10.NI.C.01
CodeHS Lessons
Illustrate how sensitive data and critical infrastructure can be affected by malware and other attacks and recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Standard |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
15.2 What is Cybersecurity? |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
8.9 Common Security Problems |
8.11 Types of SQLi and Prevention |
Standard |
5.1 Network Attacks |
5.2 Malware Types and Prevention |
5.3 Common Network Attacks |
5.5 Cross-site Scripting |
8.2 Assessing Risks |
Standard |
13.7 Network Attacks |
13.9 Impact of Cybersecurity |
13.1 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
1.12 Common Security Problems |
8.7 Network Attacks |
22.11 Cross-site Scripting |
22.10 Types of SQLi and Prevention |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
8.3 Impact of Cybersecurity |
8.2 What is Cybersecurity? |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
2.4 Privacy & Security |
5.9 Network Attacks |
5.10 Securing a Network |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.7 Privacy & Security |
Standard |
4.4 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.3 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
5.10 Common Security Problems |
5.12 Types of SQLi and Prevention |
13.2 Assessing Risks |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
