Please enable JavaScript to use CodeHS

AL 9-12: 17

CodeHS Lessons

Discuss the ethical ramifications of malicious hacking and its impact on society. Examples: Dissemination of privileged information, ransomware.

Standard
7.7 Ethical Issues Around Data Collection
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
Standard
8.2 Assessing Risks
Standard
15.3 Impact of Cybersecurity
Standard
13.9 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
5.13 Ethical Issues Around Data Collection
Standard
1.2 Impact of Cybersecurity
1.11 Hacking Ethics
Standard
9.13 Ethical Issues Around Data Collection
Standard
1.11 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.12 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
Standard
1.5 Hacking Ethics
8.2 Impact of Cybersecurity
Standard
11.9 Cybersecurity
Standard
1.11 Hacking Ethics
Standard
8.3 Impact of Cybersecurity
Standard
11.2 Impact of Cybersecurity
12.7 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
12.2 Assessing Risks
21.7 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
8.10 Cybersecurity
Standard
16.3 Impact of Cybersecurity
Standard
13.3 Impact of Cybersecurity
Standard
1.7 Hacking Ethics
Standard
2.7 Hacking Ethics
Standard
7.13 Ethical Issues Around Data Collection
Standard
1.3 Impact of Cybersecurity
Standard
5.13 Hacking Ethics
Standard
1.11 Hacking Ethics
Standard
13.3 Impact of Cybersecurity
Standard
11.3 Impact of Cybersecurity
Standard
1.12 Hacking Ethics
Standard
1.4 Impact of Cybersecurity
2.7 Hacking Ethics
13.2 Assessing Risks
Standard
7.9 Cybersecurity
9.2 Impact of Cybersecurity
Standard
15.3 Impact of Cybersecurity
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
15.2 Assessing Risks
Standard
1.8 Hacking Ethics
Standard
1.3 Impact of Cybersecurity
2.7 Hacking Ethics
13.2 Assessing Risks
Standard
13.3 Impact of Cybersecurity
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection
Standard
7.13 Ethical Issues Around Data Collection
Standard
3.11 Hacking Ethics