Please enable JavaScript to use CodeHS

ID 11-12: 11-12.DA.03

CodeHS Lessons

Understand and explain security policies by comparing encryption and authentication strategies (e.g. trapdoor functions and man in the middle attacks).

Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
1.2 Encryption Algorithms
1.6 Asymmetric Encryption
1.7 Digital Certificates
Standard
4.2 Encryption Algorithms
4.6 Asymmetric Encryption
4.7 Digital Certificates
Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
2.2 Symmetric Encryption
2.4 Authentication Methods
Standard
5.2 Encryption Algorithms
5.6 Asymmetric Encryption
5.7 Digital Certificates
Standard
4.8 Digital Certificates