Please enable JavaScript to use CodeHS

IA 2: 2-NI-05

CodeHS Lessons

Explain how physical and digital security measures protect electronic information.

Standard
9.3 Internet Safety
9.3 Internet Safety
9.4 Privacy & Security
9.4 Privacy & Security
10.1 Project: Public Service Announcement
10.1 Project: Public Service Announcement
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
6.1 Project: Classic Cipher Newscast
6.1 Project: Classic Cipher Newscast
7.6 Application Security
8.9 Common Security Problems
8.9 Common Security Problems
8.11 Types of SQLi and Prevention
8.11 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.7 Routing
10.7 Routing
10.8 Packets & Protocols
10.8 Packets & Protocols
10.9 Viewing a Webpage
10.9 Viewing a Webpage
Standard
1.3 Advanced Cryptography
1.3 Advanced Cryptography
1.4 Hash Functions
1.4 Hash Functions
3.1 Advanced Devices
3.2 Environmental Controls
5.5 Cross-site Scripting
5.5 Cross-site Scripting
Standard
13.5 Routing
13.6 Packets & Protocols
13.5 Routing
13.6 Packets & Protocols
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
1.8 Application Security
2.5 Routing
2.5 Routing
2.6 Packets & Protocols
2.6 Packets & Protocols
2.8 Securing a Network
2.8 Securing a Network
4.3 Hacking Ethics
4.3 Hacking Ethics
4.5 Privacy & Security
4.5 Privacy & Security
4.6 Cryptography, Cryptology, Cryptanalysis
4.6 Cryptography, Cryptology, Cryptanalysis
4.7 Hash Functions
4.7 Hash Functions
5.1 Project: Public Service Announcement
5.1 Project: Public Service Announcement
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.5 Hacking Ethics
1.5 Hacking Ethics
1.6 Common Security Problems
1.6 Common Security Problems
5.6 Routing
5.6 Routing
5.7 Packets & Protocols
5.7 Packets & Protocols
5.9 Viewing a Webpage
5.9 Viewing a Webpage
5.11 Advanced Devices
6.9 Environmental Controls
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Common Security Problems
1.12 Common Security Problems
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
21.1 Cryptography, Cryptology, Cryptanalysis
21.2 History of Cryptography
21.3 Why encrypt?
21.7 Advanced Cryptography
21.8 Hash Functions
21.10 Project: Classic Cipher Newscast
22.10 Types of SQLi and Prevention
22.11 Cross-site Scripting
22.12 Project: Security Assessment Report
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
2.1 Cryptography, Cryptology, Cryptanalysis
2.1 Cryptography, Cryptology, Cryptanalysis
2.2 History of Cryptography
2.2 History of Cryptography
3.1 Project: Classic Cipher Newscast
3.1 Project: Classic Cipher Newscast
4.3 Advanced Cryptography
4.3 Advanced Cryptography
4.4 Hash Functions
4.4 Hash Functions
6.6 Application Security
9.9 Common Security Problems
9.9 Common Security Problems
9.11 Types of SQLi and Prevention
9.11 Types of SQLi and Prevention
10.1 Project: Security Assessment Report
10.1 Project: Security Assessment Report
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.7 Routing
24.8 Packets & Protocols
24.9 Viewing a Webpage
21.3 Internet Safety
21.4 Privacy & Security
21.7 Hacking Ethics
22.1 Project: Public Service Announcement
24.7 Routing
24.8 Packets & Protocols
24.9 Viewing a Webpage
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
2.8 Project: Public Service Announcement
2.8 Project: Public Service Announcement
5.5 Routing
5.5 Routing
5.6 Packets & Protocols
5.6 Packets & Protocols
5.7 Viewing a Webpage
5.7 Viewing a Webpage
5.10 Securing a Network
5.10 Securing a Network
5.11 Project: Secure the Company's Network
5.11 Project: Secure the Company's Network
Standard
1.4 Environmental Controls
2.1 Privacy & Security
2.1 Privacy & Security
3.6 Application Security
4.8 Advanced Devices
7.7 Routing
7.7 Routing
7.8 Packets & Protocols
7.8 Packets & Protocols
7.10 Viewing a Webpage
7.10 Viewing a Webpage
Standard
5.7 Privacy & Security
5.7 Privacy & Security
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
1.6 Internet Safety
1.6 Internet Safety
1.7 Privacy & Security
1.7 Privacy & Security
1.12 Hacking Ethics
1.12 Hacking Ethics
1.13 Project: Public Service Announcement
1.13 Project: Public Service Announcement
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
5.3 Advanced Cryptography
5.3 Advanced Cryptography
5.4 Hash Functions
5.4 Hash Functions
7.6 Application Security
8.6 Common Security Problems
8.6 Common Security Problems
8.8 Types of SQLi and Prevention
8.8 Types of SQLi and Prevention
9.1 Project: Security Assessment Report
9.1 Project: Security Assessment Report
10.7 Routing
10.7 Routing
10.8 Packets & Protocols
10.8 Packets & Protocols
10.9 Viewing a Webpage
10.9 Viewing a Webpage
Standard
10.3 Internet Safety
10.3 Internet Safety
10.4 Privacy & Security
10.4 Privacy & Security
10.7 Project: Public Service Announcement
10.7 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.8 Project: Public Service Announcement
4.8 Project: Public Service Announcement
Standard
1.6 Application Security
2.7 Routing
2.7 Routing
2.8 Packets & Protocols
2.8 Packets & Protocols
2.9 Viewing a Webpage
2.9 Viewing a Webpage
Standard
1.5 Privacy & Security
1.5 Privacy & Security
12.1 Project: Public Service Announcement
12.1 Project: Public Service Announcement
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.1 Cryptography, Cryptology, Cryptanalysis
4.1 Cryptography, Cryptology, Cryptanalysis
4.2 History of Cryptography
4.2 History of Cryptography
4.6 Hash Functions
4.6 Hash Functions
5.1 Project: Classic Cipher Newscast
5.1 Project: Classic Cipher Newscast
6.6 Application Security
7.4 Common Security Problems
7.4 Common Security Problems
7.6 Types of SQLi and Prevention
7.6 Types of SQLi and Prevention
8.1 Project: Security Assessment Report
8.1 Project: Security Assessment Report
9.7 Routing
9.7 Routing
9.8 Packets & Protocols
9.8 Packets & Protocols
9.9 Viewing a Webpage
9.9 Viewing a Webpage
14.5 Cross-site Scripting
14.5 Cross-site Scripting
Standard
1.3 Privacy & Security
1.3 Privacy & Security
1.8 Hacking Ethics
1.8 Hacking Ethics
Standard
2.3 Internet Safety
2.3 Internet Safety
2.4 Privacy & Security
2.4 Privacy & Security
2.7 Hacking Ethics
2.7 Hacking Ethics
3.1 Project: Public Service Announcement
3.1 Project: Public Service Announcement
4.6 Application Security
5.10 Common Security Problems
5.10 Common Security Problems
5.12 Types of SQLi and Prevention
5.12 Types of SQLi and Prevention
6.1 Project: Security Assessment Report
6.1 Project: Security Assessment Report
8.1 Cryptography, Cryptology, Cryptanalysis
8.1 Cryptography, Cryptology, Cryptanalysis
8.2 History of Cryptography
8.2 History of Cryptography
9.7 Routing
9.7 Routing
9.8 Packets & Protocols
9.8 Packets & Protocols
9.9 Viewing a Webpage
9.9 Viewing a Webpage
Standard
1.5 Internet Safety
1.5 Internet Safety
1.6 Privacy & Security
1.6 Privacy & Security
1.11 Hacking Ethics
1.11 Hacking Ethics
1.12 Project: Public Service Announcement
1.12 Project: Public Service Announcement
Standard
4.3 Internet Safety
4.3 Internet Safety
4.4 Privacy & Security
4.4 Privacy & Security
4.5 Project: Public Service Announcement
4.5 Project: Public Service Announcement
5.1 Cryptography, Cryptology, Cryptanalysis
5.1 Cryptography, Cryptology, Cryptanalysis
5.2 History of Cryptography
5.2 History of Cryptography
Standard
5.7 Advanced Devices
Standard
5.7 Advanced Devices