Please enable JavaScript to use CodeHS

CT 3A: 3A-NI-05

CodeHS Lessons

Give examples to illustrate how sensitive data can be affected by malware and other attacks.

Standard
11.9 Cybersecurity
Standard
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.8 System Administration
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.10 SQL Injection Overview
8.10 SQL Injection Overview
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
11.7 Network Management
Standard
1.4 Hash Functions
1.4 Hash Functions
5.2 Malware Types and Prevention
5.5 Cross-site Scripting
5.5 Cross-site Scripting
Standard
13.1 What is Cybersecurity?
13.7 Network Attacks
13.9 Impact of Cybersecurity
13.1 What is Cybersecurity?
13.7 Network Attacks
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.15 Network Management
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.9 System Administration
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.5 Privacy & Security
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.6 Common Security Problems
5.13 Network Management
8.2 Impact of Cybersecurity
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.7 Network Attacks
8.7 Network Attacks
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.9 SQL Injection Overview
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
8.2 What is Cybersecurity?
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
4.4 Hash Functions
6.8 System Administration
7.7 Network Management
9.1 Inside Web Apps
9.1 Inside Web Apps
9.2 Developer Tools
9.2 Developer Tools
9.9 Common Security Problems
9.9 Common Security Problems
9.10 SQL Injection Overview
9.10 SQL Injection Overview
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
21.4 Privacy & Security
22.1 Project: Public Service Announcement
21.4 Privacy & Security
22.1 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
8.10 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
2.4 Privacy & Security
2.4 Privacy & Security
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.9 Network Attacks
5.9 Network Attacks
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.1 Privacy & Security
2.1 Privacy & Security
3.8 System Administration
4.12 Network Management
Standard
5.7 Privacy & Security
5.7 Privacy & Security
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.7 Privacy & Security
1.7 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.8 System Administration
8.2 Malware Types and Prevention
8.6 Common Security Problems
8.6 Common Security Problems
8.7 SQL Injection Overview
8.7 SQL Injection Overview
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
11.7 Network Management
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.4 System Administration
11.3 Network Management
Standard
10.4 Privacy & Security
10.4 Privacy & Security
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
14.2 What is Cybersecurity?
14.3 Impact of Cybersecurity
14.2 What is Cybersecurity?
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
Standard
1.8 System Administration
Standard
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.8 System Administration
7.4 Common Security Problems
7.4 Common Security Problems
7.5 SQL Injection Overview
7.5 SQL Injection Overview
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
10.7 Network Management
14.2 Malware Types and Prevention
14.5 Cross-site Scripting
14.5 Cross-site Scripting
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.8 System Administration
5.2 Inside Web Apps
5.2 Inside Web Apps
5.3 Developer Tools
5.3 Developer Tools
5.10 Common Security Problems
5.10 Common Security Problems
5.11 SQL Injection Overview
5.11 SQL Injection Overview
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
10.7 Network Management
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
5.6 Cybersecurity
Standard
1.8 System Administration
Standard
1.4 Privacy & Security
1.4 Privacy & Security
2.1 Project: Public Service Announcement
2.1 Project: Public Service Announcement
6.9 Network Attacks
6.9 Network Attacks
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.1 Inside Web Apps
10.1 Inside Web Apps
10.2 Developer Tools
10.2 Developer Tools
10.9 Common Security Problems
10.9 Common Security Problems
10.10 SQL Injection Overview
10.10 SQL Injection Overview
10.11 Types of SQLi and Prevention
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
10.12 Cross-site Scripting
11.1 Cryptography, Cryptology, Cryptanalysis
11.1 Cryptography, Cryptology, Cryptanalysis
11.2 History of Cryptography
11.2 History of Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast