Please enable JavaScript to use CodeHS

AK 6-8: 8.GCEI.SLE.01

CodeHS Lessons

Discuss the social impacts and ethical considerations associated with cybersecurity, including the positive and malicious purposes of hacking.

1.11 Hacking Ethics
1.11 Hacking Ethics
1.3 Impact of Cybersecurity
21.7 Hacking Ethics
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
1.11 Hacking Ethics
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
1.12 Hacking Ethics
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.11 Hacking Ethics
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
13.9 Impact of Cybersecurity
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
7.7 The Impact of the Internet
8.1 Project: The Effects of the Internet
15.3 Impact of Cybersecurity
7.7 The Impact of the Internet
14.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
9.7 The Impact of the Internet
13.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
3.7 The Impact of the Internet
13.1 Project: The Effects of the Internet
12.7 The Impact of the Internet
12.8 Project: The Effects of the Internet
1.8 The Impact of the Internet
3.7 The Impact of the Internet
3.8 Project: The Effects of the Internet