Please enable JavaScript to use CodeHS

AL 9-12: 12

CodeHS Lessons

Describe how sensitive data can be affected by malware and other attacks.

1.3 Impact of Cybersecurity
6.6 Application Security
6.7 Browser Configuration
9.9 Common Security Problems
12.2 Assessing Risks
1.3 Impact of Cybersecurity
6.6 Application Security
6.7 Browser Configuration
7.4 Common Security Problems
14.2 Malware Types and Prevention
16.2 Assessing Risks
1.3 Impact of Cybersecurity
4.6 Application Security
4.7 Browser Configuration
5.10 Common Security Problems
13.2 Assessing Risks
1.4 Impact of Cybersecurity
7.6 Application Security
7.7 Browser Configuration
8.2 Malware Types and Prevention
8.6 Common Security Problems
13.2 Assessing Risks
1.12 Common Security Problems
1.3 Impact of Cybersecurity
7.6 Application Security
7.7 Browser Configuration
8.9 Common Security Problems
5.2 Malware Types and Prevention
8.2 Assessing Risks
1.8 Application Security
4.2 Impact of Cybersecurity
1.6 Application Security
1.7 Browser Configuration
1.3 Impact of Cybersecurity
3.6 Application Security
3.7 Browser Configuration
6.8 Browser Configuration
13.9 Impact of Cybersecurity
15.3 Impact of Cybersecurity
14.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity
13.3 Impact of Cybersecurity