Please enable JavaScript to use CodeHS

MD 9-10: 10.NI.C.01

CodeHS Lessons

Illustrate how sensitive data and critical infrastructure can be affected by malware and other attacks and recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
5.1 Network Attacks
5.2 Malware Types and Prevention
5.3 Common Network Attacks
5.5 Cross-site Scripting
8.2 Assessing Risks
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
2.4 Privacy & Security
5.9 Network Attacks
5.10 Securing a Network
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
13.2 Assessing Risks
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?