Please enable JavaScript to use CodeHS

TX CS 1: 130.421.c.5.d

CodeHS Lessons

Investigate measures, including passwords and virus detection/prevention, to protect computer systems and databases from unauthorized use and tampering; and

Standard
9.3 Internet Safety
9.4 Privacy & Security
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.3 Internet Safety
2.4 Privacy & Security
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
Standard
5.5 Cross-site Scripting
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
1.12 Common Security Problems
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.4 The CIA Triad
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
2.3 Internet Safety
2.4 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.6 Internet Safety
1.7 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.3 Internet Safety
2.4 Privacy & Security
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
Standard
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.5 Internet Safety
1.6 Privacy & Security
Standard
4.3 Internet Safety
4.4 Privacy & Security
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.4 The CIA Triad