Please enable JavaScript to use CodeHS

Tennessee Computer Science Foundations: 30

CodeHS Lessons

Using various sources (i.e., internet, textbooks, videos, and journals), research and identify reasons as to why data security should be a priority to technology professionals through demonstrating an understanding of information security fundamentals on Confidentiality, Availability, and Integrity.

Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
Standard
13.4 The CIA Triad