Please enable JavaScript to use CodeHS

SC 6-8: 8.IC.3.1

CodeHS Lessons

Identify risks associated with sharing information digitally (i.e., phishing, identity theft, hacking).

Standard
12.7 The Impact of the Internet
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.9 Common Security Problems
Standard
5.5 Cross-site Scripting
Standard
6.4 Cybersecurity
7.1 Digital Footprint and Reputation
7.4 Privacy & Security
7.7 Hacking Ethics
Standard
5.1 Digital Footprint and Reputation
5.4 Privacy & Security
5.7 Hacking Ethics
Standard
2.4 Cybersecurity
Standard
9.4 Privacy & Security
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
1.7 Hacking Ethics
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.7 Privacy & Security
11.9 Common Security Problems
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
2.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.2 Impact of Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
8.7 Network Attacks
22.11 Cross-site Scripting
21.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
12.4 Privacy & Security
14.9 Common Security Problems
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Cryptography, Cryptology, Cryptanalysis
9.9 Common Security Problems
21.4 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.4 Privacy & Security
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
10.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
6.9 Network Attacks
10.9 Common Security Problems
10.12 Cross-site Scripting
11.1 Cryptography, Cryptology, Cryptanalysis
Standard
2.4 Privacy & Security
5.9 Network Attacks
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
1.7 Hacking Ethics
4.4 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
Standard
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
17.9 Common Security Problems
17.9 Common Security Problems
Standard
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
Standard
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
Standard
4.4 Privacy & Security
Standard
1.5 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
4.1 Cryptography, Cryptology, Cryptanalysis
7.4 Common Security Problems
14.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
5.10 Common Security Problems
8.1 Cryptography, Cryptology, Cryptanalysis
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
Standard
4.4 Privacy & Security
5.1 Cryptography, Cryptology, Cryptanalysis
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.7 The Impact of the Internet
Standard
8.7 The Impact of the Internet
Standard
4.4 Cybersecurity
6.1 Digital Footprint and Reputation
6.4 Privacy & Security
6.7 Hacking Ethics
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security
Standard
2.4 Cybersecurity
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.7 Hacking Ethics