Please enable JavaScript to use CodeHS

CSTA 3A: 3A-NI-05

CodeHS Lessons

Give examples to illustrate how sensitive data can be affected by malware and other attacks.

1.1 What is Cybersecurity?
1.6 Privacy & Security
1.13 Project: Public Service Announcement
13.1 What is Cybersecurity?
13.7 Network Attacks
9.4 Privacy & Security
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
10.4 Privacy & Security
10.7 Project: Public Service Announcement
14.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
8.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
4.4 Privacy & Security
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
13.2 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.3 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
5.4 Hash Functions
7.8 System Administration
8.2 Malware Types and Prevention
8.6 Common Security Problems
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
1.2 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.8 System Administration
5.2 Inside Web Apps
5.3 Developer Tools
5.10 Common Security Problems
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
1.2 What is Cybersecurity?
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
6.8 System Administration
9.1 Inside Web Apps
9.2 Developer Tools
9.9 Common Security Problems
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
21.4 Privacy & Security
22.1 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.13 Project: Public Service Announcement
1.9 System Administration
4.1 What is Cybersecurity?
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
5.1 Project: Public Service Announcement
1.2 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.8 System Administration
7.4 Common Security Problems
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
14.2 Malware Types and Prevention
14.5 Cross-site Scripting
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.2 What is Cybersecurity?
2.1 Privacy & Security
3.8 System Administration
1.2 What is Cybersecurity?
2.4 Privacy & Security
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
7.8 System Administration
8.1 Inside Web Apps
8.2 Developer Tools
8.9 Common Security Problems
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.12 Common Security Problems
1.13 Project: Public Service Announcement
8.7 Network Attacks
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
4.4 Privacy & Security
4.8 Project: Public Service Announcement
2.4 Privacy & Security
2.8 Project: Public Service Announcement
5.9 Network Attacks
5.11 Project: Secure the Company's Network
1.3 Privacy & Security
1.6 Common Security Problems
1.5 Privacy & Security
12.1 Project: Public Service Announcement
1.4 Hash Functions
5.2 Malware Types and Prevention
5.5 Cross-site Scripting
1.8 System Administration