Please enable JavaScript to use CodeHS

DE 3B: 3B-NI-04

CodeHS Lessons

Compare ways software developers protect devices and information from unauthorized access.

1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
13.8 The CIA Triad
13.6 Packets & Protocols
13.8 The CIA Triad
13.6 Packets & Protocols
9.1 Digital Footprint and Reputation
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
15.4 The CIA Triad
15.4 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
10.1 Digital Footprint and Reputation
10.1 Digital Footprint and Reputation
10.4 Privacy & Security
10.4 Privacy & Security
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
14.4 The CIA Triad
14.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
8.4 The CIA Triad
8.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
13.4 The CIA Triad
13.4 The CIA Triad
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.2 History of Cryptography
2.2 History of Cryptography
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.5 The CIA Triad
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.5 Software Licenses
8.6 Common Security Problems
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.8 Packets & Protocols
10.8 Packets & Protocols
13.2 Assessing Risks
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.5 Software Licenses
5.2 Inside Web Apps
5.2 Inside Web Apps
5.3 Developer Tools
5.3 Developer Tools
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.2 History of Cryptography
8.2 History of Cryptography
9.8 Packets & Protocols
9.8 Packets & Protocols
13.2 Assessing Risks
1.4 The CIA Triad
1.4 The CIA Triad
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.5 Software Licenses
9.1 Inside Web Apps
9.1 Inside Web Apps
9.2 Developer Tools
9.2 Developer Tools
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
12.2 Assessing Risks
21.1 Digital Footprint and Reputation
21.4 Privacy & Security
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.8 Packets & Protocols
21.1 Digital Footprint and Reputation
21.4 Privacy & Security
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.8 Packets & Protocols
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
1.3 The CIA Triad
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
1.7 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
2.6 Packets & Protocols
2.6 Packets & Protocols
2.8 Securing a Network
2.8 Securing a Network
4.3 Hacking Ethics
4.3 Hacking Ethics
4.4 The CIA Triad
4.4 The CIA Triad
4.5 Privacy & Security
4.5 Privacy & Security
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.2 History of Cryptography
4.2 History of Cryptography
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.5 Software Licenses
7.4 Common Security Problems
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
9.8 Packets & Protocols
9.8 Packets & Protocols
14.5 Cross-site Scripting
14.5 Cross-site Scripting
16.2 Assessing Risks
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
1.4 The CIA Triad
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.5 Software Licenses
8.1 Inside Web Apps
8.1 Inside Web Apps
8.2 Developer Tools
8.2 Developer Tools
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.8 Packets & Protocols
10.8 Packets & Protocols
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Privacy & Security
1.3 Privacy & Security
1.8 Hacking Ethics
1.8 Hacking Ethics
1.2 The CIA Triad
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.1 Inside Web Apps
22.2 Developer Tools
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
4.1 Digital Footprint and Reputation
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
4.4 Privacy & Security
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
2.1 Digital Footprint and Reputation
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.6 Packets & Protocols
5.6 Packets & Protocols
5.10 Securing a Network
5.10 Securing a Network
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
1.2 Digital Footprint and Reputation
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
6.5 Software Licenses
5.7 Privacy & Security
5.7 Privacy & Security
2.1 Privacy & Security
2.1 Privacy & Security
3.5 Software Licenses
7.8 Packets & Protocols
7.8 Packets & Protocols
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
5.5 Cross-site Scripting
5.5 Cross-site Scripting
8.2 Assessing Risks
1.5 Software Licenses
2.8 Packets & Protocols
2.8 Packets & Protocols
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
7.7 Cryptography
8.10 Cybersecurity
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity
41.1 Cryptography
31.1 Practice PT: Steganography
8.10 Cryptography
9.1 Practice PT: Steganography
11.9 Cybersecurity