Please enable JavaScript to use CodeHS

AK 6-8: 8.GCEI.SLE.01

CodeHS Lessons

Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.

Standard
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
Standard
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
Standard
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
1.8 The Impact of the Internet
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
8.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
21.7 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
2.7 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
9.2 Impact of Cybersecurity
Standard
7.7 The Impact of the Internet
14.3 Impact of Cybersecurity
Standard
3.7 The Impact of the Internet
13.1 Project: The Effects of the Internet
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity