Please enable JavaScript to use CodeHS

APCSP20: IOC-2.C.3

CodeHS Lessons

Data sent over public networks can be intercepted, analyzed and modified. One way that this can happen is through a rogue access point.

Standard
11.9 Cybersecurity
Standard
14.5 Introduction to Networking
Standard
8.1 Introduction to Networking
Standard
8.1 Introduction to Networking
Standard
11.9 Cybersecurity
Standard
8.10 Cybersecurity
Standard
7.9 Cybersecurity
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity