Please enable JavaScript to use CodeHS

DE 3A: 3A-IC-24

CodeHS Lessons

Evaluate the ways computing impacts personal, ethical, social, economic, and cultural practices.

Standard
5.10 Ethical and Social Implications of Computing
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
15.1 The Impacts of Computing
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
15.1 The Impacts of Computing
Standard
4.1 Collecting and Storing Data
6.5 Optimizing Web Information
Standard
8.1 Collecting and Storing Data
9.5 Optimizing Web Information
Standard
1.4 Hash Functions
1.4 Hash Functions
Standard
12.9 The Impact of the Internet
12.10 Creative Credit & Copyright
12.10 Creative Credit & Copyright
17.1 The Impacts of Computing
32.1 The Effects of the Internet
Standard
6.5 The CIA Triad
6.5 The CIA Triad
Standard
1.4 Digital Footprint and Reputation
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
13.1 What is Cybersecurity?
13.9 Impact of Cybersecurity
13.8 The CIA Triad
Standard
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.2 Cyberbullying
9.2 Cyberbullying
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
9.5 Information Literacy
9.5 Information Literacy
9.6 Creative Credit & Copyright
9.6 Creative Credit & Copyright
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.1 Module Overview - Cybersecurity
15.4 The CIA Triad
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
15.1 Module Overview - Cybersecurity
15.4 The CIA Triad
15.3 Impact of Cybersecurity
15.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
4.18 Ethical and Social Implications of Computing
Standard
1.1 What is Cybersecurity?
1.2 Impact of Cybersecurity
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.6 Internet Safety
1.7 Privacy & Security
1.9 Information Literacy
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
10.1 Collecting and Storing Data
11.5 Optimizing Web Information
12.9 Common Security Problems
Standard
1.7 The Impact of the Internet
1.7 The Impact of the Internet
7.10 Ethical and Social Implications of Computing
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
4.12 The Impact of the Internet
4.12 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
3.12 The Impact of the Internet
3.12 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
5.7 The Impact of the Internet
5.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
5.8 The Impact of the Internet
5.8 The Impact of the Internet
Standard
2.1 Introduction to the Internet
2.1 Introduction to the Internet
2.7 Impact of the Internet
2.7 Impact of the Internet
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.2 Impact of Cybersecurity
4.2 Impact of Cybersecurity
4.3 Hacking Ethics
4.3 Hacking Ethics
4.4 The CIA Triad
4.4 The CIA Triad
4.5 Privacy & Security
4.5 Privacy & Security
4.7 Hash Functions
4.7 Hash Functions
4.8 Cyberbullying
4.8 Cyberbullying
4.9 Creative Credit & Copyright
4.9 Creative Credit & Copyright
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Creative Credit & Copyright
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
4.5 Impact of the Internet
4.5 Impact of the Internet
11.4 Collecting and Storing Data
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
5.1 Introduction to the Internet
5.1 Introduction to the Internet
5.2 Impact of the Internet
5.2 Impact of the Internet
5.9 Viewing a Webpage
5.9 Viewing a Webpage
8.2 Impact of Cybersecurity
8.2 Impact of Cybersecurity
Standard
11.9 Cybersecurity
11.10 The Impact of the Internet
11.11 Creative Credit & Copyright
11.11 Creative Credit & Copyright
12.1 The Effects of the Internet
15.1 The Impacts of Computing
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
8.8 The Impact of the Internet
8.8 The Impact of the Internet
22.12 Project: Security Assessment Report
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.3 Why encrypt?
21.2 History of Cryptography
21.3 Why encrypt?
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
21.2 History of Cryptography
22.12 Project: Security Assessment Report
Standard
8.1 Collecting and Storing Data
9.5 Optimizing Web Information
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Creative Credit & Copyright
1.4 Creative Credit & Copyright
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
4.5 Impact of the Internet
4.5 Impact of the Internet
11.4 Collecting and Storing Data
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.1 Module Overview - Cybersecurity
8.4 The CIA Triad
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
8.1 Module Overview - Cybersecurity
8.4 The CIA Triad
8.3 Impact of Cybersecurity
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.1 What is Cybersecurity?
11.2 Impact of Cybersecurity
11.2 Impact of Cybersecurity
11.3 The CIA Triad
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.1 Digital Footprint and Reputation
12.2 Cyberbullying
12.2 Cyberbullying
12.3 Internet Safety
12.3 Internet Safety
12.4 Privacy & Security
12.4 Privacy & Security
12.5 Information Literacy
12.5 Information Literacy
12.6 Creative Credit & Copyright
12.6 Creative Credit & Copyright
12.7 Hacking Ethics
12.7 Hacking Ethics
14.9 Common Security Problems
14.9 Common Security Problems
15.1 Introduction to the Internet
15.1 Introduction to the Internet
15.9 Viewing a Webpage
15.9 Viewing a Webpage
15.10 Impact of the Internet
15.10 Impact of the Internet
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.4 Hash Functions
4.4 Hash Functions
9.9 Common Security Problems
9.9 Common Security Problems
21.4 Privacy & Security
24.10 Impact of the Internet
21.5 Information Literacy
21.6 Creative Credit & Copyright
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
10.1 Project: Security Assessment Report
24.1 Introduction to the Internet
24.9 Viewing a Webpage
21.1 Digital Footprint and Reputation
21.3 Internet Safety
21.2 Cyberbullying
21.1 Digital Footprint and Reputation
24.10 Impact of the Internet
24.9 Viewing a Webpage
24.1 Introduction to the Internet
10.1 Project: Security Assessment Report
22.1 Project: Public Service Announcement
21.7 Hacking Ethics
21.6 Creative Credit & Copyright
21.5 Information Literacy
21.4 Privacy & Security
21.3 Internet Safety
21.2 Cyberbullying
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
8.12 Creative Credit & Copyright
8.12 Creative Credit & Copyright
Standard
8.10 Cybersecurity
8.11 The Impact of the Internet
8.12 Creative Credit & Copyright
8.12 Creative Credit & Copyright
Standard
16.1 Module Overview - Cybersecurity
10.2 History of Cryptography
8.5 Project: Public Service Announcement
8.4 Privacy & Security
8.3 Internet Safety
8.2 Cyberbullying
8.1 Digital Footprint and Reputation
16.4 The CIA Triad
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
16.1 Module Overview - Cybersecurity
10.2 History of Cryptography
8.5 Project: Public Service Announcement
8.4 Privacy & Security
8.3 Internet Safety
8.2 Cyberbullying
8.1 Digital Footprint and Reputation
16.4 The CIA Triad
16.3 Impact of Cybersecurity
16.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.2 Cyberbullying
1.3 Internet Safety
1.3 Internet Safety
1.4 Privacy & Security
1.4 Privacy & Security
1.5 Information Literacy
1.5 Information Literacy
1.6 Creative Credit & Copyright
1.6 Creative Credit & Copyright
1.7 Hacking Ethics
1.7 Hacking Ethics
2.1 Project: Public Service Announcement
2.1 Project: Public Service Announcement
6.1 Introduction to the Internet
6.1 Introduction to the Internet
6.7 Viewing a Webpage
6.7 Viewing a Webpage
6.8 Impact of the Internet
6.8 Impact of the Internet
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.9 Common Security Problems
11.2 History of Cryptography
11.2 History of Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast
Standard
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.1 Introduction to the Internet
5.1 Introduction to the Internet
5.7 Viewing a Webpage
5.7 Viewing a Webpage
5.8 Impact of the Internet
5.8 Impact of the Internet
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
2.1 Introduction to the Internet
2.9 Viewing a Webpage
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
6.18 Ethical and Social Implications of Computing
Standard
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
2.1 Privacy & Security
2.1 Privacy & Security
2.2 Creative Credit & Copyright
2.2 Creative Credit & Copyright
7.1 Introduction to the Internet
7.1 Introduction to the Internet
7.10 Viewing a Webpage
7.10 Viewing a Webpage
7.11 Impact of the Internet
7.11 Impact of the Internet
Standard
5.1 What is Cybersecurity?
5.1 What is Cybersecurity?
5.2 The CIA Triad
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.3 Digital Footprint and Reputation
5.4 Cyberbullying
5.4 Cyberbullying
5.5 Internet Safety
5.5 Internet Safety
5.6 Privacy & Security
5.6 Privacy & Security
5.7 Information Literacy
5.7 Information Literacy
5.11 Creative Credit & Copyright
5.11 Creative Credit & Copyright
5.13 Hacking Ethics
5.13 Hacking Ethics
5.14 Project: Public Service Announcement
5.14 Project: Public Service Announcement
8.7 The Impact of the Internet
8.7 The Impact of the Internet
Standard
4.5 The CIA Triad
4.5 The CIA Triad
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
3.7 The Impact of the Internet
3.7 The Impact of the Internet
Standard
5.7 Privacy & Security
5.7 Privacy & Security
5.8 Creative Credit & Copyright
5.8 Creative Credit & Copyright
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
7.11 Creative Credit & Copyright
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
11.1 Module Overview - Cybersecurity
11.1 Module Overview - Cybersecurity
11.2 What is Cybersecurity?
11.2 What is Cybersecurity?
11.3 Impact of Cybersecurity
11.3 Impact of Cybersecurity
11.4 The CIA Triad
11.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
1.5 Information Literacy
Standard
8.4 Creative Credit & Copyright
Standard
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.3 Internet Safety
1.4 Privacy & Security
1.5 Information Literacy
Standard
8.4 Creative Credit & Copyright
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 The CIA Triad
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.5 Cyberbullying
1.5 Cyberbullying
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.8 Information Literacy
1.8 Information Literacy
1.11 Creative Credit & Copyright
1.11 Creative Credit & Copyright
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
5.7 The Impact of the Internet
5.7 The Impact of the Internet
Standard
1.2 Module Overview - Cybersecurity
1.2 Module Overview - Cybersecurity
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
1.4 Impact of Cybersecurity
1.4 Impact of Cybersecurity
1.5 The CIA Triad
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.4 Hash Functions
5.4 Hash Functions
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
10.1 Introduction to the Internet
10.1 Introduction to the Internet
10.9 Viewing a Webpage
10.9 Viewing a Webpage
10.10 Impact of the Internet
10.10 Impact of the Internet
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
10.1 Collecting and Storing Data
11.5 Optimizing Web Information
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
10.1 Collecting and Storing Data
11.5 Optimizing Web Information
Standard
7.9 Cybersecurity
7.10 The Impact of the Internet
7.11 Creative Credit & Copyright
7.11 Creative Credit & Copyright
9.1 What is Cybersecurity?
9.1 What is Cybersecurity?
9.2 Impact of Cybersecurity
9.2 Impact of Cybersecurity
9.3 The CIA Triad
9.3 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.1 Digital Footprint and Reputation
1.2 Cyberbullying
1.2 Cyberbullying
1.3 Internet Safety
1.3 Internet Safety
1.4 Creative Credit & Copyright
1.4 Creative Credit & Copyright
1.5 Project: Public Service Announcement
1.5 Project: Public Service Announcement
2.1 What is Cybersecurity?
2.1 What is Cybersecurity?
2.2 The CIA Triad
2.2 The CIA Triad
2.4 Hacking Ethics
2.4 Hacking Ethics
3.2 Information Literacy
3.2 Information Literacy
Standard
10.1 Digital Footprint and Reputation
10.2 Cyberbullying
10.3 Internet Safety
10.4 Privacy & Security
10.5 Information Literacy
10.6 Creative Credit & Copyright
10.7 Project: Public Service Announcement
15.1 Module Overview - Cybersecurity
15.2 What is Cybersecurity?
15.3 Impact of Cybersecurity
15.4 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.3 Internet Safety
4.4 Privacy & Security
4.6 Creative Credit & Copyright
4.7 Project: Public Service Announcement
21.3 Project: Public Service Announcement
Standard
6.13 Optimizing Web Information
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Cyberbullying
1.3 Cyberbullying
1.5 Privacy & Security
1.5 Privacy & Security
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
5.18 Optimizing Web Information
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.3 Internet Safety
2.4 Privacy & Security
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
7.4 Common Security Problems
8.1 Introduction to the Internet
8.10 Viewing a Webpage
8.12 Impact of the Internet
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
1.4 Information Literacy
1.4 Information Literacy
1.7 Creative Credit & Copyright
1.7 Creative Credit & Copyright
1.8 Hacking Ethics
1.8 Hacking Ethics
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.10 Common Security Problems
5.10 Common Security Problems
8.2 History of Cryptography
8.2 History of Cryptography
9.1 Introduction to the Internet
9.1 Introduction to the Internet
9.9 Viewing a Webpage
9.9 Viewing a Webpage
9.10 Impact of the Internet
9.10 Impact of the Internet
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
12.18 Ethical and Social Implications of Computing
12.18 Ethical and Social Implications of Computing
Standard
5.6 Cybersecurity
5.8 The Impact of the Internet
18.18 Ethical and Social Implications of Computing
18.18 Ethical and Social Implications of Computing
Standard
4.5 The CIA Triad
4.5 The CIA Triad
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
4.1 Collecting and Storing Data
5.5 Optimizing Web Information
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
9.1 Collecting and Storing Data
10.5 Optimizing Web Information
Standard
2.1 Introduction to the Internet
2.1 Introduction to the Internet
2.9 Viewing a Webpage
2.9 Viewing a Webpage
2.10 Creative Credit & Copyright
2.10 Creative Credit & Copyright
2.11 Impact of the Internet
2.11 Impact of the Internet
6.19 Ethical and Social Implications of Computing
Standard
10.9 Cybersecurity
10.10 The Impact of the Internet
10.11 Creative Credit & Copyright
11.1 The Effects of the Internet
14.1 The Impacts of Computing
Standard
1.1 Module Overview - Cybersecurity
1.1 Module Overview - Cybersecurity
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.3 Impact of Cybersecurity
1.3 Impact of Cybersecurity
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.2 Cyberbullying
2.2 Cyberbullying
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.5 Information Literacy
2.5 Information Literacy
2.6 Creative Credit & Copyright
2.6 Creative Credit & Copyright
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
8.9 Common Security Problems
8.9 Common Security Problems
9.1 Introduction to the Internet
9.1 Introduction to the Internet
9.9 Viewing a Webpage
9.9 Viewing a Webpage
9.10 Impact of the Internet
9.10 Impact of the Internet
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
Standard
2.5 The CIA Triad
2.5 The CIA Triad
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.2 Cyberbullying
4.2 Cyberbullying
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
13.1 Module Overview - Cybersecurity
13.4 The CIA Triad
13.3 Impact of Cybersecurity
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.4 Cyberbullying
1.4 Cyberbullying
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.7 Information Literacy
1.7 Information Literacy
1.10 Creative Credit & Copyright
1.10 Creative Credit & Copyright
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
4.7 The Impact of the Internet
4.7 The Impact of the Internet