Please enable JavaScript to use CodeHS

SC 9-12: HS2.NI.2.2

CodeHS Lessons

Compare and contrast ways software developers protect devices and information from unauthorized access (e.g., encryption, authentication strategies, secure coding, safeguarding keys) (CSTA, 2017).

Standard
1.3 Advanced Cryptography
1.4 Hash Functions
8.2 Assessing Risks
6.1 Project Security Assessment Report
Standard
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
Standard
13.2 Assessing Risks