- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
CYBER ORG 9-12: 9-12.SEC.NET
CodeHS Lessons
Analyze the different types of attacks that affect network security. Clarification statement: At this level, student discussions should focus on previous standards as well as grade-appropriate examples of attacks, such as malware, hacks, malicious users, and poor security policies. In addition, risk analysis and management can be introduced through discussions around monitoring and logging of attacks.
Standard |
5.1 Network Attacks |
5.2 Malware Types and Prevention |
5.3 Common Network Attacks |
5.5 Cross-site Scripting |
5.6 Internal Threats |
8.3 Risk Response |
Standard |
8.3 Network Attacks |
8.4 Malware Types and Prevention |
8.5 Common Network Attacks |
8.7 Internal Threats |
Standard |
22.11 Cross-site Scripting |
Standard |
12.3 Risk Response |
Standard |
10.12 Cross-site Scripting |
Standard |
8.1 Network Attacks |
8.2 Malware Types and Prevention |
13.3 Risk Response |
Standard |
13.1 Network Attacks |
13.2 Malware Types and Prevention |
13.3 Common Network Attacks |
13.5 Cross-site Scripting |
13.6 Internal Threats |
15.3 Risk Response |
Standard |
13.3 Risk Response |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company