Please enable JavaScript to use CodeHS

CYBER ORG 9-12: 9-12.SEC.CIA

CodeHS Lessons

Explain various interactions between the CIA Triad and the three states of data. Clarification statement: At this level, student discussions should focus on previous standards as well as grade-appropriate examples of interactions and how people, processes, and technology support those interactions. In addition, the three states of data refer to “data in use” (currently being accessed), “data at rest” (waiting to be accessed), and “data in motion” (moving from one location to another).

Standard
5.6 Internal Threats
Standard
6.5 The CIA Triad
Standard
2.5 The CIA Triad
Standard
13.8 The CIA Triad
Standard
15.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
8.7 Internal Threats
Standard
2.5 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.2 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
16.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
5.2 The CIA Triad
Standard
4.5 The CIA Triad
Standard
1.2 The CIA Triad
Standard
13.4 The CIA Triad
Standard
11.4 The CIA Triad
Standard
9.3 The CIA Triad
Standard
15.4 The CIA Triad
Standard
1.4 The CIA Triad
13.6 Internal Threats
Standard
1.2 The CIA Triad
Standard
1.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
1.4 The CIA Triad
Standard
13.4 The CIA Triad
Standard
4.7 The CIA Triad