Please enable JavaScript to use CodeHS

CSTA 3A: 3A-IC-30

CodeHS Lessons

Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.

1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
5.8 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Common Security Problems
1.13 Project: Public Service Announcement
8.8 The Impact of the Internet
21.2 History of Cryptography
21.3 Why encrypt?
21.10 Project: Classic Cipher Newscast
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
2.2 History of Cryptography
5.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.6 Privacy & Security
1.9 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
4.12 The Impact of the Internet
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
1.10 Data Collection & Limitations
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
5.7 The Impact of the Internet
1.2 The CIA Triad
1.3 Privacy & Security
1.8 Hacking Ethics
4.7 The Impact of the Internet
13.9 Impact of Cybersecurity
13.8 The CIA Triad
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.4 Privacy & Security
10.1 Project: Public Service Announcement
15.3 Impact of Cybersecurity
15.4 The CIA Triad
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
10.7 Project: Public Service Announcement
14.3 Impact of Cybersecurity
14.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
8.3 Impact of Cybersecurity
8.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.2 History of Cryptography
13.3 Impact of Cybersecurity
13.4 The CIA Triad
1.4 Impact of Cybersecurity
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.2 History of Cryptography
7.6 Application Security
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
10.10 Impact of the Internet
13.2 Assessing Risks
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
8.2 History of Cryptography
9.10 Impact of the Internet
13.2 Assessing Risks
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
6.6 Application Security
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
12.2 Assessing Risks
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.10 Impact of the Internet
1.8 Application Security
2.7 Impact of the Internet
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.4 The CIA Triad
4.5 Privacy & Security
5.1 Project: Public Service Announcement
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.2 History of Cryptography
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
9.11 Impact of the Internet
14.5 Cross-site Scripting
16.2 Assessing Risks
1.3 Impact of Cybersecurity
2.1 Privacy & Security
3.6 Application Security
7.11 Impact of the Internet
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
10.10 Impact of the Internet
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
12.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.5 Hacking Ethics
1.6 Common Security Problems
8.13 Impact of the Internet
9.3 Collecting and Storing Data
5.5 Cross-site Scripting
8.2 Assessing Risks
1.6 Application Security
2.11 Impact of the Internet
4.1 Collecting and Storing Data
8.10 Cybersecurity
10.3 Data Collection & Limitations
16.3 Data Collection & Limitations
32.1 The Effects of the Internet
11.9 Cybersecurity
12.1 The Effects of the Internet
13.3 Data Collection & Limitations
11.9 Cybersecurity
12.1 The Effects of the Internet
13.3 Data Collection & Limitations
11.9 Cybersecurity
12.1 The Effects of the Internet
13.3 Data Collection & Limitations