Please enable JavaScript to use CodeHS

DE 3A: 3A-NI-06

CodeHS Lessons

Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.

Standard
11.9 Cybersecurity
Standard
4.1 Collecting and Storing Data
Standard
8.1 Collecting and Storing Data
Standard
4.9 Browser Configuration
4.10 System Administration
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
8.3 Risk Response
6.1 Project Security Assessment Report
Standard
1.4 Digital Footprint and Reputation
Standard
13.1 What is Cybersecurity?
13.1 What is Cybersecurity?
Standard
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.2 What is Cybersecurity?
15.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.7 Privacy & Security
10.1 Collecting and Storing Data
12.9 Common Security Problems
12.11 Types of SQLi and Prevention
Standard
5.9 Browser Configuration
5.10 System Administration
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.9 System Administration
2.8 Network Administration
2.8 Network Administration
4.1 What is Cybersecurity?
4.1 What is Cybersecurity?
4.5 Privacy & Security
4.5 Privacy & Security
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.6 Common Security Problems
11.4 Collecting and Storing Data
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.6 Common Security Problems
Standard
11.9 Cybersecurity
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
21.2 History of Cryptography
22.12 Project: Security Assessment Report
22.11 Cross-site Scripting
22.10 Types of SQLi and Prevention
21.10 Project: Classic Cipher Newscast
21.8 Hash Functions
21.7 Advanced Cryptography
21.3 Why encrypt?
21.2 History of Cryptography
Standard
8.1 Collecting and Storing Data
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.6 Common Security Problems
1.6 Common Security Problems
11.4 Collecting and Storing Data
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.2 What is Cybersecurity?
8.2 What is Cybersecurity?
Standard
11.1 What is Cybersecurity?
11.1 What is Cybersecurity?
12.1 Digital Footprint and Reputation
12.1 Digital Footprint and Reputation
12.3 Internet Safety
12.3 Internet Safety
12.4 Privacy & Security
12.4 Privacy & Security
13.7 Browser Configuration
13.8 System Administration
14.9 Common Security Problems
14.9 Common Security Problems
14.11 Types of SQLi and Prevention
14.11 Types of SQLi and Prevention
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.7 Browser Configuration
6.8 System Administration
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
12.2 Assessing Risks
12.3 Risk Response
22.1 Project: Public Service Announcement
21.4 Privacy & Security
21.3 Internet Safety
21.1 Digital Footprint and Reputation
10.1 Project: Security Assessment Report
22.1 Project: Public Service Announcement
21.4 Privacy & Security
10.1 Project: Security Assessment Report
21.3 Internet Safety
21.1 Digital Footprint and Reputation
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
2.3 Asymmetric Encryption
3.7 Browser Configuration
3.8 System Administration
Standard
2.3 Asymmetric Encryption
4.7 Browser Configuration
4.8 System Administration
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
8.10 Cybersecurity
Standard
16.2 What is Cybersecurity?
8.1 Digital Footprint and Reputation
8.3 Internet Safety
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.2 History of Cryptography
16.2 What is Cybersecurity?
8.1 Digital Footprint and Reputation
8.3 Internet Safety
8.4 Privacy & Security
8.5 Project: Public Service Announcement
10.2 History of Cryptography
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.3 Internet Safety
1.4 Privacy & Security
1.4 Privacy & Security
2.1 Project: Public Service Announcement
2.1 Project: Public Service Announcement
6.10 Network Administration
6.10 Network Administration
7.1 Project: Secure the Company's Network
7.1 Project: Secure the Company's Network
10.9 Common Security Problems
10.9 Common Security Problems
10.11 Types of SQLi and Prevention
10.11 Types of SQLi and Prevention
10.12 Cross-site Scripting
10.12 Cross-site Scripting
11.2 History of Cryptography
11.2 History of Cryptography
11.7 Advanced Cryptography
11.7 Advanced Cryptography
11.8 Hash Functions
11.8 Hash Functions
12.1 Project: Classic Cipher Newscast
12.1 Project: Classic Cipher Newscast
Standard
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.10 Network Administration
5.10 Network Administration
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
2.1 Privacy & Security
2.1 Privacy & Security
3.7 Browser Configuration
3.8 System Administration
Standard
5.1 What is Cybersecurity?
5.1 What is Cybersecurity?
5.3 Digital Footprint and Reputation
5.3 Digital Footprint and Reputation
5.5 Internet Safety
5.5 Internet Safety
5.6 Privacy & Security
5.6 Privacy & Security
5.8 Browser Configuration
5.14 Project: Public Service Announcement
5.14 Project: Public Service Announcement
Standard
5.7 Privacy & Security
5.7 Privacy & Security
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
2.3 Asymmetric Encryption
4.9 Browser Configuration
4.10 System Administration
Standard
7.9 Cybersecurity
Standard
2.3 Asymmetric Encryption
4.9 Browser Configuration
4.10 System Administration
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
10.9 Browser Configuration
10.10 System Administration
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
11.2 What is Cybersecurity?
11.2 What is Cybersecurity?
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.4 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.3 What is Cybersecurity?
1.3 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.7 Browser Configuration
7.8 System Administration
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.9 Common Security Problems
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
17.11 Types of SQLi and Prevention
13.2 Assessing Risks
13.3 Risk Response
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
10.1 Collecting and Storing Data
Standard
2.3 Digital Footprint and Reputation
2.5 Cybersecurity
10.1 Collecting and Storing Data
Standard
7.9 Cybersecurity
9.1 What is Cybersecurity?
9.1 What is Cybersecurity?
9.4 System Administration
Standard
1.1 Digital Footprint and Reputation
1.1 Digital Footprint and Reputation
1.3 Internet Safety
1.3 Internet Safety
1.5 Project: Public Service Announcement
1.5 Project: Public Service Announcement
2.1 What is Cybersecurity?
2.1 What is Cybersecurity?
Standard
10.1 Digital Footprint and Reputation
10.3 Internet Safety
10.4 Privacy & Security
10.7 Project: Public Service Announcement
15.2 What is Cybersecurity?
Standard
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.4 Privacy & Security
4.7 Project: Public Service Announcement
21.3 Project: Public Service Announcement
Standard
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.4 Privacy & Security
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
6.7 Browser Configuration
6.8 System Administration
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
13.5 Cross-site Scripting
15.2 Assessing Risks
15.3 Risk Response
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Privacy & Security
1.3 Privacy & Security
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.7 Browser Configuration
4.8 System Administration
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
8.2 History of Cryptography
8.2 History of Cryptography
13.2 Assessing Risks
13.3 Risk Response
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
5.6 Cybersecurity
6.8 Browser Configuration
Standard
5.6 Cybersecurity
7.8 Browser Configuration
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
Standard
4.1 Collecting and Storing Data
Standard
1.3 Digital Footprint and Reputation
1.5 Cybersecurity
9.1 Collecting and Storing Data
Standard
1.7 Browser Configuration
1.8 System Administration
Standard
10.9 Cybersecurity
Standard
1.2 What is Cybersecurity?
1.2 What is Cybersecurity?
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.7 Browser Configuration
7.8 System Administration
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
14.1 Project: Security Assessment Report
14.1 Project: Security Assessment Report
Standard
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.2 What is Cybersecurity?
13.2 What is Cybersecurity?
Standard
1.1 What is Cybersecurity?
1.1 What is Cybersecurity?
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement