Please enable JavaScript to use CodeHS

APCSP20: IOC-2.C.6

CodeHS Lessons

Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised.

Standard
11.9 Cybersecurity
Standard
13.1 Introduction to Cybersecurity
Standard
2.1 Introduction to Cybersecurity
Standard
2.1 Introduction to Cybersecurity
Standard
11.9 Cybersecurity
Standard
8.10 Cybersecurity
Standard
7.9 Cybersecurity
Standard
7.9 Cybersecurity
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
10.9 Cybersecurity