Please enable JavaScript to use CodeHS

Tennessee Coding I

Lesson 8.3 Security in Coding

Description

In this lesson, students will explore how attackers can exploit weaknesses in websites and programs. They will learn about SQL Injection and Cross-Site Scripting (XSS), as well as programming errors that can cause vulnerabilities.


Objective

Students will be able to:

  • Identify the commands used in SQL Injection attacks
  • Explain how attackers gain unauthorized access through SQL Injection
  • Describe the importance of input validation in preventing security vulnerabilities
  • Explain how buffer and integer overflows can be exploited for security breaches