Please enable JavaScript to use CodeHS

MD 9-10: 10.NI.C.01

CodeHS Lessons

Illustrate how sensitive data and critical infrastructure can be affected by malware and other attacks and recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
11.9 Common Security Problems
11.11 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
2.8 Network Administration
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.2 Impact of Cybersecurity
8.3 Network Attacks
8.4 Malware Types and Prevention
8.5 Common Network Attacks
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.4 Privacy & Security
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
21.4 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.4 Privacy & Security
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
6.9 Network Attacks
6.10 Network Administration
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Network Administration
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
8.1 Network Attacks
8.2 Malware Types and Prevention
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
14.1 Network Attacks
14.2 Malware Types and Prevention
14.3 Common Network Attacks
14.5 Cross-site Scripting
16.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security