Please enable JavaScript to use CodeHS

CSTA 3A: 3A-NI-05

CodeHS Lessons

Give examples to illustrate how sensitive data can be affected by malware and other attacks.

Standard
11.9 Cybersecurity
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
7.8 System Administration
8.1 Inside Web Apps
8.2 Developer Tools
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
Standard
1.4 Hash Functions
5.2 Malware Types and Prevention
5.5 Cross-site Scripting
Standard
9.4 Privacy & Security
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
Standard
13.1 What is Cybersecurity?
13.7 Network Attacks
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.7 Privacy & Security
11.1 Inside Web Apps
11.2 Developer Tools
11.9 Common Security Problems
11.10 SQL Injection Overview
11.11 Types of SQLi and Prevention
Standard
6.10 System Administration
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.13 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.13 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.13 Project: Public Service Announcement
Standard
1.9 System Administration
4.1 What is Cybersecurity?
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
5.1 Project: Public Service Announcement
Standard
1.3 Privacy & Security
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.6 Common Security Problems
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
1.13 Project: Public Service Announcement
8.7 Network Attacks
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
12.4 Privacy & Security
13.8 System Administration
14.1 Inside Web Apps
14.2 Developer Tools
14.9 Common Security Problems
14.10 SQL Injection Overview
14.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
6.8 System Administration
9.1 Inside Web Apps
9.2 Developer Tools
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
21.4 Privacy & Security
22.1 Project: Public Service Announcement
10.1 Project: Security Assessment Report
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
16.2 What is Cybersecurity?
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.1 Cryptography, Cryptology, Cryptanalysis
10.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.4 Privacy & Security
2.1 Project: Public Service Announcement
6.9 Network Attacks
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.2 Developer Tools
10.9 Common Security Problems
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
Standard
2.4 Privacy & Security
2.8 Project: Public Service Announcement
5.9 Network Attacks
5.11 Project: Secure the Company's Network
Standard
1.8 System Administration
Standard
1.2 What is Cybersecurity?
2.1 Privacy & Security
3.8 System Administration
Standard
5.1 What is Cybersecurity?
5.6 Privacy & Security
5.14 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
5.7 Privacy & Security
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.13 Project: Public Service Announcement
Standard
1.3 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
5.4 Hash Functions
7.8 System Administration
8.2 Malware Types and Prevention
17.9 Common Security Problems
17.9 Common Security Problems
17.10 SQL Injection Overview
17.10 SQL Injection Overview
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
17.2 Developer Tools
17.1 Inside Web Apps
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
9.4 System Administration
Standard
1.5 Project: Public Service Announcement
2.1 What is Cybersecurity?
Standard
10.4 Privacy & Security
10.7 Project: Public Service Announcement
15.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
4.7 Project: Public Service Announcement
Standard
1.5 Privacy & Security
12.1 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.8 System Administration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
13.2 Malware Types and Prevention
13.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.8 System Administration
5.2 Inside Web Apps
5.3 Developer Tools
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
6.1 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
Standard
5.6 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.5 Cybersecurity
Standard
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
3.1 What is Cybersecurity?
3.6 Privacy & Security
3.12 Project: Public Service Announcement