Please enable JavaScript to use CodeHS

NY 9-12: 9-12.CY.2

CodeHS Lessons

Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
Standard
9.4 Privacy & Security
15.4 The CIA Triad
Standard
1.4 The CIA Triad
2.4 Privacy & Security
7.6 Application Security
Standard
3.2 Environmental Controls
5.2 Malware Types and Prevention
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
8.4 The CIA Triad
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
2.4 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
1.3 The CIA Triad
1.7 Privacy & Security
Standard
4.4 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
4.6 Application Security
Standard
1.2 The CIA Triad
1.6 Privacy & Security
Standard
4.4 Privacy & Security
13.4 The CIA Triad
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection